Sep 13 00:50:27.071014 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:50:27.071047 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:50:27.071061 kernel: BIOS-provided physical RAM map: Sep 13 00:50:27.071071 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:50:27.071080 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 13 00:50:27.071089 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 13 00:50:27.071104 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc4fff] reserved Sep 13 00:50:27.071114 kernel: BIOS-e820: [mem 0x000000003ffc5000-0x000000003ffd1fff] usable Sep 13 00:50:27.071123 kernel: BIOS-e820: [mem 0x000000003ffd2000-0x000000003fffafff] ACPI data Sep 13 00:50:27.071133 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 13 00:50:27.071142 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 13 00:50:27.071152 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 13 00:50:27.071161 kernel: printk: bootconsole [earlyser0] enabled Sep 13 00:50:27.071171 kernel: NX (Execute Disable) protection: active Sep 13 00:50:27.071185 kernel: efi: EFI v2.70 by Microsoft Sep 13 00:50:27.071196 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f33fa98 RNG=0x3ffd2018 Sep 13 00:50:27.071207 kernel: random: crng init done Sep 13 00:50:27.071217 kernel: SMBIOS 3.1.0 present. Sep 13 00:50:27.071227 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 00:50:27.071238 kernel: Hypervisor detected: Microsoft Hyper-V Sep 13 00:50:27.071248 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 13 00:50:27.071258 kernel: Hyper-V Host Build:26100-10.0-1-0.1293 Sep 13 00:50:27.071270 kernel: Hyper-V: Nested features: 0x1e0101 Sep 13 00:50:27.071280 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 13 00:50:27.071291 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 13 00:50:27.071301 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 13 00:50:27.071311 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 13 00:50:27.071323 kernel: tsc: Detected 2793.437 MHz processor Sep 13 00:50:27.071334 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:50:27.071344 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:50:27.071355 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 13 00:50:27.071366 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:50:27.071378 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 13 00:50:27.071389 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 13 00:50:27.071399 kernel: Using GB pages for direct mapping Sep 13 00:50:27.083852 kernel: Secure boot disabled Sep 13 00:50:27.083879 kernel: ACPI: Early table checksum verification disabled Sep 13 00:50:27.083891 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 13 00:50:27.083902 kernel: ACPI: XSDT 0x000000003FFF90E8 00005C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.083914 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.083933 kernel: ACPI: DSDT 0x000000003FFD6000 01E11C (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 00:50:27.083945 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 13 00:50:27.083956 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.083968 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.083979 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.083990 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.084005 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.084016 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:27.084028 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 13 00:50:27.084039 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff411b] Sep 13 00:50:27.084050 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 13 00:50:27.084062 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 13 00:50:27.084073 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 13 00:50:27.084085 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 13 00:50:27.084096 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 13 00:50:27.084110 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 13 00:50:27.084121 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 13 00:50:27.084133 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:50:27.084144 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:50:27.084156 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 13 00:50:27.084168 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 13 00:50:27.084180 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 13 00:50:27.084191 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 13 00:50:27.084203 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 13 00:50:27.084216 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 13 00:50:27.084228 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 13 00:50:27.084240 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 13 00:50:27.084251 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 13 00:50:27.084263 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 13 00:50:27.084274 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 13 00:50:27.084286 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 13 00:50:27.084298 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 13 00:50:27.084311 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 13 00:50:27.084323 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 13 00:50:27.084334 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 13 00:50:27.084346 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 13 00:50:27.084358 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Sep 13 00:50:27.084370 kernel: Zone ranges: Sep 13 00:50:27.084382 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:50:27.084393 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 13 00:50:27.084420 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:50:27.084433 kernel: Movable zone start for each node Sep 13 00:50:27.084443 kernel: Early memory node ranges Sep 13 00:50:27.084454 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 13 00:50:27.084466 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 13 00:50:27.084477 kernel: node 0: [mem 0x000000003ffc5000-0x000000003ffd1fff] Sep 13 00:50:27.084488 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 13 00:50:27.084500 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:50:27.084511 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 13 00:50:27.084522 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:50:27.084535 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 13 00:50:27.084547 kernel: On node 0, zone DMA32: 132 pages in unavailable ranges Sep 13 00:50:27.084557 kernel: On node 0, zone DMA32: 45 pages in unavailable ranges Sep 13 00:50:27.084568 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 13 00:50:27.084579 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 13 00:50:27.084591 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:50:27.084604 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:50:27.084616 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:50:27.084628 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 13 00:50:27.084643 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:50:27.084655 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 13 00:50:27.084668 kernel: Booting paravirtualized kernel on Hyper-V Sep 13 00:50:27.084681 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:50:27.084694 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:50:27.084706 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:50:27.084719 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:50:27.084731 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:50:27.084741 kernel: Hyper-V: PV spinlocks enabled Sep 13 00:50:27.084754 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:50:27.084764 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062375 Sep 13 00:50:27.084774 kernel: Policy zone: Normal Sep 13 00:50:27.084786 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:50:27.084798 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:50:27.084809 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 13 00:50:27.084820 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:50:27.084831 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:50:27.084846 kernel: Memory: 8069180K/8387512K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 318072K reserved, 0K cma-reserved) Sep 13 00:50:27.084857 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:50:27.084877 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:50:27.084891 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:50:27.084903 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:50:27.084916 kernel: rcu: RCU event tracing is enabled. Sep 13 00:50:27.084927 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:50:27.084939 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:50:27.084951 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:50:27.084962 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:50:27.084973 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:50:27.084985 kernel: Using NULL legacy PIC Sep 13 00:50:27.084999 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 13 00:50:27.085011 kernel: Console: colour dummy device 80x25 Sep 13 00:50:27.085022 kernel: printk: console [tty1] enabled Sep 13 00:50:27.085033 kernel: printk: console [ttyS0] enabled Sep 13 00:50:27.085045 kernel: printk: bootconsole [earlyser0] disabled Sep 13 00:50:27.085057 kernel: ACPI: Core revision 20210730 Sep 13 00:50:27.085068 kernel: Failed to register legacy timer interrupt Sep 13 00:50:27.085078 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:50:27.085090 kernel: Hyper-V: Using IPI hypercalls Sep 13 00:50:27.085102 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5586.87 BogoMIPS (lpj=2793437) Sep 13 00:50:27.085114 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 13 00:50:27.085127 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 13 00:50:27.085139 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 13 00:50:27.085151 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:50:27.085165 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:50:27.085177 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:50:27.085189 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 13 00:50:27.085202 kernel: RETBleed: Vulnerable Sep 13 00:50:27.085214 kernel: Speculative Store Bypass: Vulnerable Sep 13 00:50:27.085225 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:50:27.085237 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:50:27.085248 kernel: active return thunk: its_return_thunk Sep 13 00:50:27.085260 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:50:27.085272 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:50:27.085284 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:50:27.085298 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:50:27.085310 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 13 00:50:27.085321 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 13 00:50:27.085333 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 13 00:50:27.085345 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:50:27.085356 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 13 00:50:27.085368 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 13 00:50:27.085380 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 13 00:50:27.085392 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 13 00:50:27.085418 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:50:27.085430 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:50:27.085444 kernel: LSM: Security Framework initializing Sep 13 00:50:27.085456 kernel: SELinux: Initializing. Sep 13 00:50:27.085468 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:50:27.085481 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:50:27.085493 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8370C CPU @ 2.80GHz (family: 0x6, model: 0x6a, stepping: 0x6) Sep 13 00:50:27.085505 kernel: Performance Events: unsupported p6 CPU model 106 no PMU driver, software events only. Sep 13 00:50:27.085517 kernel: signal: max sigframe size: 3632 Sep 13 00:50:27.085529 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:50:27.085542 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:50:27.085554 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:50:27.085569 kernel: x86: Booting SMP configuration: Sep 13 00:50:27.085581 kernel: .... node #0, CPUs: #1 Sep 13 00:50:27.085594 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 13 00:50:27.085607 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:50:27.085620 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:50:27.085633 kernel: smpboot: Max logical packages: 1 Sep 13 00:50:27.085645 kernel: smpboot: Total of 2 processors activated (11173.74 BogoMIPS) Sep 13 00:50:27.085657 kernel: devtmpfs: initialized Sep 13 00:50:27.085669 kernel: x86/mm: Memory block size: 128MB Sep 13 00:50:27.085684 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 13 00:50:27.085697 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:50:27.085710 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:50:27.085722 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:50:27.085734 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:50:27.085746 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:50:27.085758 kernel: audit: type=2000 audit(1757724625.024:1): state=initialized audit_enabled=0 res=1 Sep 13 00:50:27.085770 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:50:27.085784 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:50:27.085797 kernel: cpuidle: using governor menu Sep 13 00:50:27.085809 kernel: ACPI: bus type PCI registered Sep 13 00:50:27.085821 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:50:27.085834 kernel: dca service started, version 1.12.1 Sep 13 00:50:27.085847 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:50:27.085859 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:50:27.085871 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:50:27.085882 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:50:27.085896 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:50:27.085908 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:50:27.085920 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:50:27.085932 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:50:27.085943 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:50:27.085956 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:50:27.085967 kernel: ACPI: Interpreter enabled Sep 13 00:50:27.085979 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:50:27.085991 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:50:27.086003 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:50:27.086017 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 13 00:50:27.086029 kernel: iommu: Default domain type: Translated Sep 13 00:50:27.086042 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:50:27.086054 kernel: vgaarb: loaded Sep 13 00:50:27.086066 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:50:27.086078 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:50:27.086090 kernel: PTP clock support registered Sep 13 00:50:27.086102 kernel: Registered efivars operations Sep 13 00:50:27.086114 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:50:27.086128 kernel: PCI: System does not support PCI Sep 13 00:50:27.086140 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 13 00:50:27.086152 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:50:27.086164 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:50:27.086177 kernel: pnp: PnP ACPI init Sep 13 00:50:27.086189 kernel: pnp: PnP ACPI: found 3 devices Sep 13 00:50:27.086201 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:50:27.086214 kernel: NET: Registered PF_INET protocol family Sep 13 00:50:27.086226 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:50:27.086240 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 13 00:50:27.086253 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:50:27.086266 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:50:27.086278 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 13 00:50:27.086290 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 13 00:50:27.086302 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:50:27.086315 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:50:27.086327 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:50:27.086340 kernel: NET: Registered PF_XDP protocol family Sep 13 00:50:27.086354 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:50:27.086366 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 13 00:50:27.086379 kernel: software IO TLB: mapped [mem 0x000000003aa89000-0x000000003ea89000] (64MB) Sep 13 00:50:27.086391 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:50:27.086417 kernel: Initialise system trusted keyrings Sep 13 00:50:27.086429 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 13 00:50:27.086441 kernel: Key type asymmetric registered Sep 13 00:50:27.086453 kernel: Asymmetric key parser 'x509' registered Sep 13 00:50:27.086465 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:50:27.086480 kernel: io scheduler mq-deadline registered Sep 13 00:50:27.086492 kernel: io scheduler kyber registered Sep 13 00:50:27.086504 kernel: io scheduler bfq registered Sep 13 00:50:27.086516 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:50:27.086529 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:50:27.086541 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:50:27.086553 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 13 00:50:27.086564 kernel: i8042: PNP: No PS/2 controller found. Sep 13 00:50:27.086738 kernel: rtc_cmos 00:02: registered as rtc0 Sep 13 00:50:27.086854 kernel: rtc_cmos 00:02: setting system clock to 2025-09-13T00:50:26 UTC (1757724626) Sep 13 00:50:27.086959 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 13 00:50:27.086974 kernel: intel_pstate: CPU model not supported Sep 13 00:50:27.086986 kernel: efifb: probing for efifb Sep 13 00:50:27.086998 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 00:50:27.087010 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 00:50:27.087022 kernel: efifb: scrolling: redraw Sep 13 00:50:27.087037 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 00:50:27.087049 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:50:27.087060 kernel: fb0: EFI VGA frame buffer device Sep 13 00:50:27.087072 kernel: pstore: Registered efi as persistent store backend Sep 13 00:50:27.087085 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:50:27.087096 kernel: Segment Routing with IPv6 Sep 13 00:50:27.087109 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:50:27.087121 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:50:27.087133 kernel: Key type dns_resolver registered Sep 13 00:50:27.087146 kernel: IPI shorthand broadcast: enabled Sep 13 00:50:27.087158 kernel: sched_clock: Marking stable (774089900, 23419100)->(1034811300, -237302300) Sep 13 00:50:27.087170 kernel: registered taskstats version 1 Sep 13 00:50:27.087182 kernel: Loading compiled-in X.509 certificates Sep 13 00:50:27.087195 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:50:27.087206 kernel: Key type .fscrypt registered Sep 13 00:50:27.087218 kernel: Key type fscrypt-provisioning registered Sep 13 00:50:27.087231 kernel: pstore: Using crash dump compression: deflate Sep 13 00:50:27.087243 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:50:27.087257 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:50:27.087269 kernel: ima: No architecture policies found Sep 13 00:50:27.087281 kernel: clk: Disabling unused clocks Sep 13 00:50:27.087293 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:50:27.087305 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:50:27.087317 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:50:27.087329 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:50:27.087341 kernel: Run /init as init process Sep 13 00:50:27.087353 kernel: with arguments: Sep 13 00:50:27.087367 kernel: /init Sep 13 00:50:27.087378 kernel: with environment: Sep 13 00:50:27.087390 kernel: HOME=/ Sep 13 00:50:27.087410 kernel: TERM=linux Sep 13 00:50:27.087421 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:50:27.087436 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:50:27.087451 systemd[1]: Detected virtualization microsoft. Sep 13 00:50:27.087465 systemd[1]: Detected architecture x86-64. Sep 13 00:50:27.087480 systemd[1]: Running in initrd. Sep 13 00:50:27.087492 systemd[1]: No hostname configured, using default hostname. Sep 13 00:50:27.087505 systemd[1]: Hostname set to . Sep 13 00:50:27.087518 systemd[1]: Initializing machine ID from random generator. Sep 13 00:50:27.087531 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:50:27.087544 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:50:27.087557 systemd[1]: Reached target cryptsetup.target. Sep 13 00:50:27.087569 systemd[1]: Reached target paths.target. Sep 13 00:50:27.087584 systemd[1]: Reached target slices.target. Sep 13 00:50:27.087596 systemd[1]: Reached target swap.target. Sep 13 00:50:27.087609 systemd[1]: Reached target timers.target. Sep 13 00:50:27.087622 systemd[1]: Listening on iscsid.socket. Sep 13 00:50:27.087635 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:50:27.087648 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:50:27.087662 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:50:27.087674 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:50:27.087689 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:50:27.087702 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:50:27.087715 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:50:27.087728 systemd[1]: Reached target sockets.target. Sep 13 00:50:27.087741 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:50:27.087754 systemd[1]: Finished network-cleanup.service. Sep 13 00:50:27.087767 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:50:27.087780 systemd[1]: Starting systemd-journald.service... Sep 13 00:50:27.087793 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:50:27.087807 systemd[1]: Starting systemd-resolved.service... Sep 13 00:50:27.087820 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:50:27.087839 systemd-journald[183]: Journal started Sep 13 00:50:27.087899 systemd-journald[183]: Runtime Journal (/run/log/journal/1f4ba21f24354815abf8a9b2b781caeb) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:50:27.061722 systemd-modules-load[184]: Inserted module 'overlay' Sep 13 00:50:27.104422 systemd[1]: Started systemd-journald.service. Sep 13 00:50:27.129126 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:50:27.129187 kernel: audit: type=1130 audit(1757724627.107:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.129710 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:50:27.138175 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 13 00:50:27.140522 kernel: Bridge firewalling registered Sep 13 00:50:27.140540 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:50:27.143113 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:50:27.146552 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:50:27.171243 kernel: audit: type=1130 audit(1757724627.134:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.175553 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:50:27.184889 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:50:27.193612 systemd-resolved[185]: Positive Trust Anchors: Sep 13 00:50:27.195913 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:50:27.199630 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:50:27.201182 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:50:27.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.236423 kernel: audit: type=1130 audit(1757724627.142:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.204373 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:50:27.260713 kernel: audit: type=1130 audit(1757724627.145:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.260735 kernel: SCSI subsystem initialized Sep 13 00:50:27.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.260804 dracut-cmdline[201]: dracut-dracut-053 Sep 13 00:50:27.234935 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 13 00:50:27.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.278029 kernel: audit: type=1130 audit(1757724627.187:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.277085 systemd[1]: Started systemd-resolved.service. Sep 13 00:50:27.325957 kernel: audit: type=1130 audit(1757724627.202:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.325991 kernel: audit: type=1130 audit(1757724627.292:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.326008 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:50:27.326026 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:50:27.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.326131 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:50:27.345750 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:50:27.292881 systemd[1]: Reached target nss-lookup.target. Sep 13 00:50:27.352019 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 13 00:50:27.355056 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:50:27.360650 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:50:27.380288 kernel: audit: type=1130 audit(1757724627.359:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.381236 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:50:27.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.400420 kernel: audit: type=1130 audit(1757724627.384:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.416422 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:50:27.437424 kernel: iscsi: registered transport (tcp) Sep 13 00:50:27.465932 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:50:27.465988 kernel: QLogic iSCSI HBA Driver Sep 13 00:50:27.494369 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:50:27.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:27.499279 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:50:27.551438 kernel: raid6: avx512x4 gen() 43961 MB/s Sep 13 00:50:27.571419 kernel: raid6: avx512x4 xor() 10739 MB/s Sep 13 00:50:27.591424 kernel: raid6: avx512x2 gen() 44499 MB/s Sep 13 00:50:27.612415 kernel: raid6: avx512x2 xor() 25656 MB/s Sep 13 00:50:27.632416 kernel: raid6: avx512x1 gen() 44481 MB/s Sep 13 00:50:27.652419 kernel: raid6: avx512x1 xor() 24809 MB/s Sep 13 00:50:27.673413 kernel: raid6: avx2x4 gen() 33329 MB/s Sep 13 00:50:27.693423 kernel: raid6: avx2x4 xor() 11174 MB/s Sep 13 00:50:27.713414 kernel: raid6: avx2x2 gen() 34533 MB/s Sep 13 00:50:27.733414 kernel: raid6: avx2x2 xor() 21443 MB/s Sep 13 00:50:27.753412 kernel: raid6: avx2x1 gen() 27451 MB/s Sep 13 00:50:27.773412 kernel: raid6: avx2x1 xor() 17272 MB/s Sep 13 00:50:27.793412 kernel: raid6: sse2x4 gen() 10243 MB/s Sep 13 00:50:27.813413 kernel: raid6: sse2x4 xor() 5952 MB/s Sep 13 00:50:27.833412 kernel: raid6: sse2x2 gen() 10278 MB/s Sep 13 00:50:27.856425 kernel: raid6: sse2x2 xor() 6615 MB/s Sep 13 00:50:27.877437 kernel: raid6: sse2x1 gen() 9364 MB/s Sep 13 00:50:27.907307 kernel: raid6: sse2x1 xor() 4190 MB/s Sep 13 00:50:27.907375 kernel: raid6: using algorithm avx512x2 gen() 44499 MB/s Sep 13 00:50:27.907386 kernel: raid6: .... xor() 25656 MB/s, rmw enabled Sep 13 00:50:27.918058 kernel: raid6: using avx512x2 recovery algorithm Sep 13 00:50:27.939423 kernel: xor: automatically using best checksumming function avx Sep 13 00:50:28.040431 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:50:28.048146 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:50:28.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:28.053000 audit: BPF prog-id=7 op=LOAD Sep 13 00:50:28.053000 audit: BPF prog-id=8 op=LOAD Sep 13 00:50:28.053922 systemd[1]: Starting systemd-udevd.service... Sep 13 00:50:28.068084 systemd-udevd[384]: Using default interface naming scheme 'v252'. Sep 13 00:50:28.072679 systemd[1]: Started systemd-udevd.service. Sep 13 00:50:28.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:28.080930 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:50:28.096705 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Sep 13 00:50:28.125727 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:50:28.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:28.130938 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:50:28.166736 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:50:28.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:28.214419 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:50:28.247716 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:50:28.247768 kernel: AES CTR mode by8 optimization enabled Sep 13 00:50:28.247782 kernel: hv_vmbus: Vmbus version:5.2 Sep 13 00:50:28.263419 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 00:50:28.269418 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:50:28.280417 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 13 00:50:28.292431 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 00:50:28.304468 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 13 00:50:28.304514 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 00:50:28.316450 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 00:50:28.325426 kernel: scsi host0: storvsc_host_t Sep 13 00:50:28.325483 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 00:50:28.325496 kernel: scsi host1: storvsc_host_t Sep 13 00:50:28.332263 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 00:50:28.338417 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 5 Sep 13 00:50:28.365758 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 00:50:28.379026 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 00:50:28.379049 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 00:50:28.395000 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 00:50:28.395176 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 00:50:28.395335 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 00:50:28.395504 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 00:50:28.395654 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 00:50:28.395804 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:28.395820 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 00:50:28.421431 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#250 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:50:28.437419 kernel: hv_netvsc 6045bdc1-8898-6045-bdc1-88986045bdc1 eth0: VF slot 1 added Sep 13 00:50:28.452061 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#213 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:50:28.452287 kernel: hv_vmbus: registering driver hv_pci Sep 13 00:50:28.462824 kernel: hv_pci 2babf2fe-64b9-47bd-8a0d-e0ba163f8861: PCI VMBus probing: Using version 0x10004 Sep 13 00:50:28.552665 kernel: hv_pci 2babf2fe-64b9-47bd-8a0d-e0ba163f8861: PCI host bridge to bus 64b9:00 Sep 13 00:50:28.552816 kernel: pci_bus 64b9:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 13 00:50:28.552962 kernel: pci_bus 64b9:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 00:50:28.553094 kernel: pci 64b9:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 00:50:28.553267 kernel: pci 64b9:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:50:28.553439 kernel: pci 64b9:00:02.0: enabling Extended Tags Sep 13 00:50:28.553605 kernel: pci 64b9:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 64b9:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 00:50:28.553766 kernel: pci_bus 64b9:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 00:50:28.553908 kernel: pci 64b9:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:50:28.648201 kernel: mlx5_core 64b9:00:02.0: enabling device (0000 -> 0002) Sep 13 00:50:28.897242 kernel: mlx5_core 64b9:00:02.0: firmware version: 16.30.5000 Sep 13 00:50:28.897449 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (442) Sep 13 00:50:28.897468 kernel: mlx5_core 64b9:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 00:50:28.897575 kernel: mlx5_core 64b9:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 13 00:50:28.897704 kernel: mlx5_core 64b9:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Sep 13 00:50:28.897808 kernel: hv_netvsc 6045bdc1-8898-6045-bdc1-88986045bdc1 eth0: VF registering: eth1 Sep 13 00:50:28.897925 kernel: mlx5_core 64b9:00:02.0 eth1: joined to eth0 Sep 13 00:50:28.792510 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:50:28.805034 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:50:28.916438 kernel: mlx5_core 64b9:00:02.0 enP25785s1: renamed from eth1 Sep 13 00:50:29.029967 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:50:29.037934 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:50:29.046288 systemd[1]: Starting disk-uuid.service... Sep 13 00:50:29.065263 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:50:29.074435 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:30.069422 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:30.070961 disk-uuid[566]: The operation has completed successfully. Sep 13 00:50:30.142260 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:50:30.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.142365 systemd[1]: Finished disk-uuid.service. Sep 13 00:50:30.157389 systemd[1]: Starting verity-setup.service... Sep 13 00:50:30.195674 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Sep 13 00:50:30.539278 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:50:30.545369 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:50:30.549335 systemd[1]: Finished verity-setup.service. Sep 13 00:50:30.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.623421 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:50:30.623707 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:50:30.625654 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:50:30.627206 systemd[1]: Starting ignition-setup.service... Sep 13 00:50:30.632119 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:50:30.662426 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:50:30.662459 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:50:30.662471 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:50:30.703887 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:50:30.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.706000 audit: BPF prog-id=9 op=LOAD Sep 13 00:50:30.711301 systemd[1]: Starting systemd-networkd.service... Sep 13 00:50:30.734736 systemd-networkd[830]: lo: Link UP Sep 13 00:50:30.734747 systemd-networkd[830]: lo: Gained carrier Sep 13 00:50:30.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.735272 systemd-networkd[830]: Enumeration completed Sep 13 00:50:30.735797 systemd[1]: Started systemd-networkd.service. Sep 13 00:50:30.738295 systemd-networkd[830]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:50:30.739357 systemd[1]: Reached target network.target. Sep 13 00:50:30.744830 systemd[1]: Starting iscsiuio.service... Sep 13 00:50:30.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.752701 systemd[1]: Started iscsiuio.service. Sep 13 00:50:30.758265 systemd[1]: Starting iscsid.service... Sep 13 00:50:30.766273 iscsid[835]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:50:30.766273 iscsid[835]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:50:30.766273 iscsid[835]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:50:30.766273 iscsid[835]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:50:30.808201 kernel: mlx5_core 64b9:00:02.0 enP25785s1: Link up Sep 13 00:50:30.808449 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:50:30.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.793125 systemd[1]: Started iscsid.service. Sep 13 00:50:30.810553 iscsid[835]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:50:30.810553 iscsid[835]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:50:30.803955 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:50:30.824242 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:50:30.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.826479 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:50:30.830251 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:50:30.832315 systemd[1]: Reached target remote-fs.target. Sep 13 00:50:30.835017 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:50:30.849433 kernel: hv_netvsc 6045bdc1-8898-6045-bdc1-88986045bdc1 eth0: Data path switched to VF: enP25785s1 Sep 13 00:50:30.847075 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:50:30.856508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:50:30.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.858821 systemd-networkd[830]: enP25785s1: Link UP Sep 13 00:50:30.858943 systemd-networkd[830]: eth0: Link UP Sep 13 00:50:30.859131 systemd-networkd[830]: eth0: Gained carrier Sep 13 00:50:30.868593 systemd-networkd[830]: enP25785s1: Gained carrier Sep 13 00:50:30.878447 systemd-networkd[830]: eth0: DHCPv4 address 10.200.4.43/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:50:30.921776 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:50:30.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:30.983838 systemd[1]: Finished ignition-setup.service. Sep 13 00:50:30.987199 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:50:32.604530 systemd-networkd[830]: eth0: Gained IPv6LL Sep 13 00:50:34.422518 ignition[858]: Ignition 2.14.0 Sep 13 00:50:34.422531 ignition[858]: Stage: fetch-offline Sep 13 00:50:34.422597 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:34.422635 ignition[858]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:34.510118 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:34.510347 ignition[858]: parsed url from cmdline: "" Sep 13 00:50:34.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.511658 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:50:34.536735 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 13 00:50:34.536766 kernel: audit: type=1130 audit(1757724634.515:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.510351 ignition[858]: no config URL provided Sep 13 00:50:34.517151 systemd[1]: Starting ignition-fetch.service... Sep 13 00:50:34.510357 ignition[858]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:50:34.510368 ignition[858]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:50:34.510376 ignition[858]: failed to fetch config: resource requires networking Sep 13 00:50:34.510637 ignition[858]: Ignition finished successfully Sep 13 00:50:34.524746 ignition[864]: Ignition 2.14.0 Sep 13 00:50:34.524754 ignition[864]: Stage: fetch Sep 13 00:50:34.524848 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:34.524869 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:34.527838 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:34.528513 ignition[864]: parsed url from cmdline: "" Sep 13 00:50:34.528519 ignition[864]: no config URL provided Sep 13 00:50:34.528525 ignition[864]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:50:34.528536 ignition[864]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:50:34.528581 ignition[864]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 00:50:34.629964 ignition[864]: GET result: OK Sep 13 00:50:34.630045 ignition[864]: config has been read from IMDS userdata Sep 13 00:50:34.630081 ignition[864]: parsing config with SHA512: 87d6ad36178cf6e7613e787af8cc234c481ffc3856c7a8964d2277b45c827fba141a4b4d24c6ea40647c74512e5ec677a416ec747cfe8f4e0b956404942d1af5 Sep 13 00:50:34.637092 unknown[864]: fetched base config from "system" Sep 13 00:50:34.639754 unknown[864]: fetched base config from "system" Sep 13 00:50:34.639770 unknown[864]: fetched user config from "azure" Sep 13 00:50:34.644276 ignition[864]: fetch: fetch complete Sep 13 00:50:34.644286 ignition[864]: fetch: fetch passed Sep 13 00:50:34.644347 ignition[864]: Ignition finished successfully Sep 13 00:50:34.649708 systemd[1]: Finished ignition-fetch.service. Sep 13 00:50:34.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.653282 systemd[1]: Starting ignition-kargs.service... Sep 13 00:50:34.671166 kernel: audit: type=1130 audit(1757724634.652:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.679039 ignition[870]: Ignition 2.14.0 Sep 13 00:50:34.679051 ignition[870]: Stage: kargs Sep 13 00:50:34.679184 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:34.679213 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:34.688743 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:34.693276 ignition[870]: kargs: kargs passed Sep 13 00:50:34.693344 ignition[870]: Ignition finished successfully Sep 13 00:50:34.697274 systemd[1]: Finished ignition-kargs.service. Sep 13 00:50:34.700286 systemd[1]: Starting ignition-disks.service... Sep 13 00:50:34.719686 kernel: audit: type=1130 audit(1757724634.699:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.709780 ignition[876]: Ignition 2.14.0 Sep 13 00:50:34.709788 ignition[876]: Stage: disks Sep 13 00:50:34.721040 systemd[1]: Finished ignition-disks.service. Sep 13 00:50:34.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.709900 ignition[876]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:34.748150 kernel: audit: type=1130 audit(1757724634.723:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.723604 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:50:34.709935 ignition[876]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:34.727568 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:50:34.716642 ignition[876]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:34.743455 systemd[1]: Reached target local-fs.target. Sep 13 00:50:34.720257 ignition[876]: disks: disks passed Sep 13 00:50:34.748138 systemd[1]: Reached target sysinit.target. Sep 13 00:50:34.720300 ignition[876]: Ignition finished successfully Sep 13 00:50:34.750082 systemd[1]: Reached target basic.target. Sep 13 00:50:34.753923 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:50:34.819966 systemd-fsck[884]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 13 00:50:34.828238 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:50:34.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.848325 systemd[1]: Mounting sysroot.mount... Sep 13 00:50:34.850510 kernel: audit: type=1130 audit(1757724634.833:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:34.929429 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:50:34.929485 systemd[1]: Mounted sysroot.mount. Sep 13 00:50:34.933910 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:50:34.969158 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:50:34.974886 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 00:50:34.982612 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:50:34.982661 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:50:34.994939 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:50:35.049996 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:50:35.052988 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:50:35.076420 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (895) Sep 13 00:50:35.087007 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:50:35.087046 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:50:35.087056 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:50:35.091521 initrd-setup-root[900]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:50:35.104097 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:50:35.127423 initrd-setup-root[926]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:50:35.146200 initrd-setup-root[934]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:50:35.166248 initrd-setup-root[942]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:50:35.839718 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:50:35.860466 kernel: audit: type=1130 audit(1757724635.840:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.844317 systemd[1]: Starting ignition-mount.service... Sep 13 00:50:35.865245 systemd[1]: Starting sysroot-boot.service... Sep 13 00:50:35.871293 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:50:35.871397 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:50:35.889097 ignition[962]: INFO : Ignition 2.14.0 Sep 13 00:50:35.892397 ignition[962]: INFO : Stage: mount Sep 13 00:50:35.892397 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:35.892397 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:35.910670 systemd[1]: Finished sysroot-boot.service. Sep 13 00:50:35.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.927502 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:35.930781 kernel: audit: type=1130 audit(1757724635.912:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.930815 ignition[962]: INFO : mount: mount passed Sep 13 00:50:35.930815 ignition[962]: INFO : Ignition finished successfully Sep 13 00:50:35.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.933085 systemd[1]: Finished ignition-mount.service. Sep 13 00:50:35.951188 kernel: audit: type=1130 audit(1757724635.934:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:36.633901 coreos-metadata[894]: Sep 13 00:50:36.633 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:50:36.652304 coreos-metadata[894]: Sep 13 00:50:36.652 INFO Fetch successful Sep 13 00:50:36.687189 coreos-metadata[894]: Sep 13 00:50:36.687 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:50:36.702280 coreos-metadata[894]: Sep 13 00:50:36.702 INFO Fetch successful Sep 13 00:50:36.722310 coreos-metadata[894]: Sep 13 00:50:36.722 INFO wrote hostname ci-3510.3.8-n-93bff2e88f to /sysroot/etc/hostname Sep 13 00:50:36.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:36.724005 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 00:50:36.742194 kernel: audit: type=1130 audit(1757724636.727:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:36.729292 systemd[1]: Starting ignition-files.service... Sep 13 00:50:36.749373 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:50:36.763428 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (973) Sep 13 00:50:36.772580 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:50:36.772611 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:50:36.772625 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:50:36.783315 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:50:36.797714 ignition[992]: INFO : Ignition 2.14.0 Sep 13 00:50:36.797714 ignition[992]: INFO : Stage: files Sep 13 00:50:36.801462 ignition[992]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:36.801462 ignition[992]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:36.812839 ignition[992]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:36.835043 ignition[992]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:50:36.851364 ignition[992]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:50:36.851364 ignition[992]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:50:36.916559 ignition[992]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:50:36.923883 ignition[992]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:50:36.946734 unknown[992]: wrote ssh authorized keys file for user: core Sep 13 00:50:36.950389 ignition[992]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:50:36.966072 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Sep 13 00:50:36.971280 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Sep 13 00:50:37.017305 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Sep 13 00:50:37.245263 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Sep 13 00:50:37.245263 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:50:37.257644 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:50:37.263083 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:50:37.269569 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:50:37.274141 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:50:37.278486 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:50:37.282779 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:50:37.286772 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:50:37.315391 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:50:37.319583 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:50:37.323539 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:50:37.329855 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:50:37.344698 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:50:37.349792 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:50:37.359309 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3143011128" Sep 13 00:50:37.365036 ignition[992]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3143011128": device or resource busy Sep 13 00:50:37.365036 ignition[992]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3143011128", trying btrfs: device or resource busy Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3143011128" Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3143011128" Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3143011128" Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3143011128" Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:50:37.365036 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:50:37.415489 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1036206758" Sep 13 00:50:37.420759 ignition[992]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1036206758": device or resource busy Sep 13 00:50:37.420759 ignition[992]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1036206758", trying btrfs: device or resource busy Sep 13 00:50:37.420759 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1036206758" Sep 13 00:50:37.420759 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1036206758" Sep 13 00:50:37.443020 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1036206758" Sep 13 00:50:37.443020 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1036206758" Sep 13 00:50:37.443020 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:50:37.443020 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:50:37.443020 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 13 00:50:37.770356 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Sep 13 00:50:37.942843 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:50:37.942843 ignition[992]: INFO : files: op(13): [started] processing unit "waagent.service" Sep 13 00:50:37.942843 ignition[992]: INFO : files: op(13): [finished] processing unit "waagent.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(14): [started] processing unit "nvidia.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(14): [finished] processing unit "nvidia.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Sep 13 00:50:37.961586 ignition[992]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:50:37.961586 ignition[992]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:50:38.044435 kernel: audit: type=1130 audit(1757724637.971:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:37.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:37.966742 systemd[1]: Finished ignition-files.service. Sep 13 00:50:38.046632 ignition[992]: INFO : files: files passed Sep 13 00:50:38.046632 ignition[992]: INFO : Ignition finished successfully Sep 13 00:50:38.007706 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:50:38.012573 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:50:38.059464 initrd-setup-root-after-ignition[1017]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:50:38.013487 systemd[1]: Starting ignition-quench.service... Sep 13 00:50:38.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.023206 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:50:38.023312 systemd[1]: Finished ignition-quench.service. Sep 13 00:50:38.035136 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:50:38.038083 systemd[1]: Reached target ignition-complete.target. Sep 13 00:50:38.045256 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:50:38.065501 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:50:38.065598 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:50:38.067719 systemd[1]: Reached target initrd-fs.target. Sep 13 00:50:38.069496 systemd[1]: Reached target initrd.target. Sep 13 00:50:38.071235 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:50:38.071891 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:50:38.105832 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:50:38.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.110270 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:50:38.121376 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:50:38.125676 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:50:38.130827 systemd[1]: Stopped target timers.target. Sep 13 00:50:38.132956 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:50:38.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.133096 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:50:38.137249 systemd[1]: Stopped target initrd.target. Sep 13 00:50:38.142105 systemd[1]: Stopped target basic.target. Sep 13 00:50:38.146245 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:50:38.151043 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:50:38.155437 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:50:38.160040 systemd[1]: Stopped target remote-fs.target. Sep 13 00:50:38.164068 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:50:38.168588 systemd[1]: Stopped target sysinit.target. Sep 13 00:50:38.172535 systemd[1]: Stopped target local-fs.target. Sep 13 00:50:38.176459 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:50:38.180421 systemd[1]: Stopped target swap.target. Sep 13 00:50:38.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.184267 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:50:38.184428 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:50:38.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.188524 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:50:38.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.192412 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:50:38.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.192558 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:50:38.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.197207 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:50:38.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.197343 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:50:38.202084 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:50:38.237670 ignition[1030]: INFO : Ignition 2.14.0 Sep 13 00:50:38.237670 ignition[1030]: INFO : Stage: umount Sep 13 00:50:38.237670 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:38.237670 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:38.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.202206 systemd[1]: Stopped ignition-files.service. Sep 13 00:50:38.206114 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 00:50:38.258357 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:38.206244 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 00:50:38.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.269085 ignition[1030]: INFO : umount: umount passed Sep 13 00:50:38.269085 ignition[1030]: INFO : Ignition finished successfully Sep 13 00:50:38.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.211957 systemd[1]: Stopping ignition-mount.service... Sep 13 00:50:38.215118 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:50:38.215272 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:50:38.219022 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:50:38.221184 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:50:38.221356 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:50:38.223929 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:50:38.224073 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:50:38.229682 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:50:38.229779 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:50:38.259645 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:50:38.259719 systemd[1]: Stopped ignition-mount.service. Sep 13 00:50:38.264631 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:50:38.264679 systemd[1]: Stopped ignition-disks.service. Sep 13 00:50:38.269206 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:50:38.269249 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:50:38.271469 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:50:38.271520 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:50:38.277685 systemd[1]: Stopped target network.target. Sep 13 00:50:38.281565 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:50:38.281625 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:50:38.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.320950 systemd[1]: Stopped target paths.target. Sep 13 00:50:38.324391 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:50:38.327727 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:50:38.331895 systemd[1]: Stopped target slices.target. Sep 13 00:50:38.335264 systemd[1]: Stopped target sockets.target. Sep 13 00:50:38.339356 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:50:38.339408 systemd[1]: Closed iscsid.socket. Sep 13 00:50:38.346215 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:50:38.346259 systemd[1]: Closed iscsiuio.socket. Sep 13 00:50:38.351511 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:50:38.354449 systemd[1]: Stopped ignition-setup.service. Sep 13 00:50:38.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.359057 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:50:38.363064 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:50:38.366286 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:50:38.371440 systemd-networkd[830]: eth0: DHCPv6 lease lost Sep 13 00:50:38.374337 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:50:38.374482 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:50:38.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.380620 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:50:38.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.380737 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:50:38.386000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:50:38.387111 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:50:38.389000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:50:38.387162 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:50:38.392256 systemd[1]: Stopping network-cleanup.service... Sep 13 00:50:38.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.395208 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:50:38.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.395266 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:50:38.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.399244 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:50:38.399291 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:50:38.404249 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:50:38.404303 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:50:38.408432 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:50:38.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.416109 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:50:38.418721 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:50:38.418880 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:50:38.424724 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:50:38.424771 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:50:38.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.430196 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:50:38.430232 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:50:38.435825 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:50:38.435896 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:50:38.443544 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:50:38.443599 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:50:38.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.457146 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:50:38.457195 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:50:38.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.465606 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:50:38.474427 kernel: hv_netvsc 6045bdc1-8898-6045-bdc1-88986045bdc1 eth0: Data path switched from VF: enP25785s1 Sep 13 00:50:38.476725 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:50:38.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.476789 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:50:38.479249 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:50:38.479355 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:50:38.506980 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:50:38.510238 systemd[1]: Stopped network-cleanup.service. Sep 13 00:50:38.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.765048 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:50:38.765164 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:50:38.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.771462 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:50:38.772513 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:50:38.772581 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:50:38.773780 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:50:38.785882 systemd[1]: Switching root. Sep 13 00:50:38.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:38.812462 iscsid[835]: iscsid shutting down. Sep 13 00:50:38.814827 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Sep 13 00:50:38.814901 systemd-journald[183]: Journal stopped Sep 13 00:50:56.295924 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:50:56.295951 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:50:56.295965 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:50:56.295973 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:50:56.295984 kernel: SELinux: policy capability open_perms=1 Sep 13 00:50:56.295992 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:50:56.296003 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:50:56.296013 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:50:56.296022 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:50:56.296031 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:50:56.296038 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:50:56.296045 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 13 00:50:56.296057 kernel: audit: type=1403 audit(1757724641.620:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:50:56.296067 systemd[1]: Successfully loaded SELinux policy in 327.665ms. Sep 13 00:50:56.296085 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.920ms. Sep 13 00:50:56.296098 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:50:56.296108 systemd[1]: Detected virtualization microsoft. Sep 13 00:50:56.296118 systemd[1]: Detected architecture x86-64. Sep 13 00:50:56.296128 systemd[1]: Detected first boot. Sep 13 00:50:56.296138 systemd[1]: Hostname set to . Sep 13 00:50:56.296150 systemd[1]: Initializing machine ID from random generator. Sep 13 00:50:56.296159 kernel: audit: type=1400 audit(1757724642.522:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:56.296171 kernel: audit: type=1400 audit(1757724642.522:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:56.296180 kernel: audit: type=1334 audit(1757724642.537:82): prog-id=10 op=LOAD Sep 13 00:50:56.296188 kernel: audit: type=1334 audit(1757724642.537:83): prog-id=10 op=UNLOAD Sep 13 00:50:56.296200 kernel: audit: type=1334 audit(1757724642.551:84): prog-id=11 op=LOAD Sep 13 00:50:56.296208 kernel: audit: type=1334 audit(1757724642.551:85): prog-id=11 op=UNLOAD Sep 13 00:50:56.296219 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:50:56.296230 kernel: audit: type=1400 audit(1757724644.190:86): avc: denied { associate } for pid=1064 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:50:56.296241 kernel: audit: type=1300 audit(1757724644.190:86): arch=c000003e syscall=188 success=yes exit=0 a0=c000024814 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:56.296251 kernel: audit: type=1327 audit(1757724644.190:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:50:56.296262 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:50:56.296276 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:50:56.296285 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:50:56.296295 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:50:56.296308 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 13 00:50:56.296316 kernel: audit: type=1334 audit(1757724655.588:88): prog-id=12 op=LOAD Sep 13 00:50:56.296328 kernel: audit: type=1334 audit(1757724655.588:89): prog-id=3 op=UNLOAD Sep 13 00:50:56.296335 kernel: audit: type=1334 audit(1757724655.598:90): prog-id=13 op=LOAD Sep 13 00:50:56.296347 kernel: audit: type=1334 audit(1757724655.609:91): prog-id=14 op=LOAD Sep 13 00:50:56.296358 kernel: audit: type=1334 audit(1757724655.609:92): prog-id=4 op=UNLOAD Sep 13 00:50:56.296370 kernel: audit: type=1334 audit(1757724655.609:93): prog-id=5 op=UNLOAD Sep 13 00:50:56.296382 kernel: audit: type=1334 audit(1757724655.621:94): prog-id=15 op=LOAD Sep 13 00:50:56.296415 kernel: audit: type=1334 audit(1757724655.621:95): prog-id=12 op=UNLOAD Sep 13 00:50:56.296427 kernel: audit: type=1334 audit(1757724655.626:96): prog-id=16 op=LOAD Sep 13 00:50:56.296439 kernel: audit: type=1334 audit(1757724655.638:97): prog-id=17 op=LOAD Sep 13 00:50:56.296447 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:50:56.296460 systemd[1]: Stopped iscsiuio.service. Sep 13 00:50:56.296470 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:50:56.296480 systemd[1]: Stopped iscsid.service. Sep 13 00:50:56.296491 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:50:56.296503 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:50:56.296513 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:50:56.296528 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:50:56.296537 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:50:56.296550 systemd[1]: Created slice system-getty.slice. Sep 13 00:50:56.296562 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:50:56.296573 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:50:56.296586 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:50:56.296598 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:50:56.296612 systemd[1]: Created slice user.slice. Sep 13 00:50:56.296623 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:50:56.296636 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:50:56.296649 systemd[1]: Set up automount boot.automount. Sep 13 00:50:56.296664 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:50:56.296680 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:50:56.296693 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:50:56.296707 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:50:56.296723 systemd[1]: Reached target integritysetup.target. Sep 13 00:50:56.296738 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:50:56.296753 systemd[1]: Reached target remote-fs.target. Sep 13 00:50:56.296766 systemd[1]: Reached target slices.target. Sep 13 00:50:56.296780 systemd[1]: Reached target swap.target. Sep 13 00:50:56.296794 systemd[1]: Reached target torcx.target. Sep 13 00:50:56.296805 systemd[1]: Reached target veritysetup.target. Sep 13 00:50:56.296814 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:50:56.296823 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:50:56.296836 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:50:56.296848 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:50:56.296857 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:50:56.296872 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:50:56.296883 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:50:56.296893 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:50:56.296904 systemd[1]: Mounting media.mount... Sep 13 00:50:56.296914 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:56.296927 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:50:56.296938 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:50:56.296949 systemd[1]: Mounting tmp.mount... Sep 13 00:50:56.296961 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:50:56.296971 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:50:56.296981 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:50:56.296991 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:50:56.297004 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:50:56.297012 systemd[1]: Starting modprobe@drm.service... Sep 13 00:50:56.297024 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:50:56.297037 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:50:56.297048 systemd[1]: Starting modprobe@loop.service... Sep 13 00:50:56.297057 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:50:56.297069 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:50:56.297080 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:50:56.297090 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:50:56.297102 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:50:56.297112 systemd[1]: Stopped systemd-journald.service. Sep 13 00:50:56.297121 systemd[1]: Starting systemd-journald.service... Sep 13 00:50:56.297134 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:50:56.297145 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:50:56.297156 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:50:56.297168 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:50:56.297177 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:50:56.297189 systemd[1]: Stopped verity-setup.service. Sep 13 00:50:56.297198 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:56.297211 kernel: loop: module loaded Sep 13 00:50:56.297219 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:50:56.297233 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:50:56.297244 systemd[1]: Mounted media.mount. Sep 13 00:50:56.297254 kernel: fuse: init (API version 7.34) Sep 13 00:50:56.297262 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:50:56.297274 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:50:56.297290 systemd[1]: Mounted tmp.mount. Sep 13 00:50:56.297306 systemd-journald[1164]: Journal started Sep 13 00:50:56.297355 systemd-journald[1164]: Runtime Journal (/run/log/journal/aac781cc9d454d328229b38d6fbf99f1) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:50:41.620000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:50:42.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:42.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:42.537000 audit: BPF prog-id=10 op=LOAD Sep 13 00:50:42.537000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:50:42.551000 audit: BPF prog-id=11 op=LOAD Sep 13 00:50:42.551000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:50:44.190000 audit[1064]: AVC avc: denied { associate } for pid=1064 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:50:44.190000 audit[1064]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024814 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:44.190000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:50:44.198000 audit[1064]: AVC avc: denied { associate } for pid=1064 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:50:44.198000 audit[1064]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248f9 a2=1ed a3=0 items=2 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:44.198000 audit: CWD cwd="/" Sep 13 00:50:44.198000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:44.198000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:44.198000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:50:55.588000 audit: BPF prog-id=12 op=LOAD Sep 13 00:50:55.588000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:50:55.598000 audit: BPF prog-id=13 op=LOAD Sep 13 00:50:55.609000 audit: BPF prog-id=14 op=LOAD Sep 13 00:50:55.609000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:50:55.609000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:50:55.621000 audit: BPF prog-id=15 op=LOAD Sep 13 00:50:55.621000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:50:55.626000 audit: BPF prog-id=16 op=LOAD Sep 13 00:50:55.638000 audit: BPF prog-id=17 op=LOAD Sep 13 00:50:55.638000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:50:55.638000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:50:55.648000 audit: BPF prog-id=18 op=LOAD Sep 13 00:50:55.648000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:50:55.648000 audit: BPF prog-id=19 op=LOAD Sep 13 00:50:55.649000 audit: BPF prog-id=20 op=LOAD Sep 13 00:50:55.649000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:50:55.649000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:50:55.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:55.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:55.666000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:50:55.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:55.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:55.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.156000 audit: BPF prog-id=21 op=LOAD Sep 13 00:50:56.156000 audit: BPF prog-id=22 op=LOAD Sep 13 00:50:56.157000 audit: BPF prog-id=23 op=LOAD Sep 13 00:50:56.157000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:50:56.157000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:50:56.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.290000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:50:56.290000 audit[1164]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff1ee76440 a2=4000 a3=7fff1ee764dc items=0 ppid=1 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:56.290000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:50:55.586967 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:50:44.076657 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:50:55.586980 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:50:44.117992 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:50:55.650343 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:50:44.118013 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:50:44.118044 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:50:44.118052 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:50:44.118091 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:50:44.118103 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:50:44.118295 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:50:44.118328 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:50:44.118338 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:50:44.162192 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:50:44.162240 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:50:44.162270 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:50:44.162282 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:50:44.162302 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:50:44.162319 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:50:51.824449 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:51.824675 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:51.824770 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:51.824920 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:51.824961 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:50:51.825013 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:50:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:50:56.305511 systemd[1]: Started systemd-journald.service. Sep 13 00:50:56.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.308187 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:50:56.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.310804 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:50:56.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.313372 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:50:56.313635 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:50:56.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.316113 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:50:56.316360 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:50:56.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.318985 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:50:56.319196 systemd[1]: Finished modprobe@drm.service. Sep 13 00:50:56.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.321666 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:50:56.321900 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:50:56.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.324648 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:50:56.324850 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:50:56.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.327215 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:50:56.327347 systemd[1]: Finished modprobe@loop.service. Sep 13 00:50:56.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.329824 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:50:56.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.332334 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:50:56.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.335061 systemd[1]: Reached target network-pre.target. Sep 13 00:50:56.338168 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:50:56.342455 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:50:56.346387 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:50:56.392316 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:50:56.396645 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:50:56.399053 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:50:56.400752 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:50:56.402739 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:50:56.404445 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:50:56.411448 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:50:56.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.414010 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:50:56.416437 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:50:56.419954 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:50:56.441745 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:50:56.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.445126 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:50:56.451593 systemd-journald[1164]: Time spent on flushing to /var/log/journal/aac781cc9d454d328229b38d6fbf99f1 is 19.745ms for 1161 entries. Sep 13 00:50:56.451593 systemd-journald[1164]: System Journal (/var/log/journal/aac781cc9d454d328229b38d6fbf99f1) is 8.0M, max 2.6G, 2.6G free. Sep 13 00:50:56.529815 systemd-journald[1164]: Received client request to flush runtime journal. Sep 13 00:50:56.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.471645 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:50:56.530065 udevadm[1187]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:50:56.474933 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:50:56.530887 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:50:56.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:56.608845 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:50:56.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:57.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:57.275986 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:50:58.016129 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:50:58.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:58.018000 audit: BPF prog-id=24 op=LOAD Sep 13 00:50:58.018000 audit: BPF prog-id=25 op=LOAD Sep 13 00:50:58.018000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:50:58.018000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:50:58.019783 systemd[1]: Starting systemd-udevd.service... Sep 13 00:50:58.038734 systemd-udevd[1190]: Using default interface naming scheme 'v252'. Sep 13 00:50:59.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:59.621000 audit: BPF prog-id=26 op=LOAD Sep 13 00:50:59.618197 systemd[1]: Started systemd-udevd.service. Sep 13 00:50:59.622709 systemd[1]: Starting systemd-networkd.service... Sep 13 00:50:59.654636 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:50:59.726426 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:50:59.738000 audit[1198]: AVC avc: denied { confidentiality } for pid=1198 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:50:59.744420 kernel: hv_vmbus: registering driver hv_balloon Sep 13 00:50:59.750423 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 00:50:59.738000 audit[1198]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a11ce9760 a1=f83c a2=7f2e9404fbc5 a3=5 items=12 ppid=1190 pid=1198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:59.738000 audit: CWD cwd="/" Sep 13 00:50:59.738000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=1 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=2 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=3 name=(null) inode=14044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=4 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=5 name=(null) inode=14045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=6 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=7 name=(null) inode=14046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=8 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=9 name=(null) inode=14047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=10 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PATH item=11 name=(null) inode=14048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:59.738000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:50:59.769621 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 00:50:59.769771 kernel: hv_vmbus: registering driver hv_utils Sep 13 00:50:59.782327 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 00:50:59.782394 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 00:50:59.782439 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 00:50:59.897149 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:50:59.898805 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:50:59.897000 audit: BPF prog-id=27 op=LOAD Sep 13 00:50:59.897000 audit: BPF prog-id=28 op=LOAD Sep 13 00:50:59.897000 audit: BPF prog-id=29 op=LOAD Sep 13 00:50:59.906175 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 00:50:59.915710 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 00:50:59.915780 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 00:50:59.919559 kernel: Console: switching to colour dummy device 80x25 Sep 13 00:50:59.927016 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:51:00.049137 systemd[1]: Started systemd-userdbd.service. Sep 13 00:51:00.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.172528 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:51:00.195118 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 13 00:51:00.289464 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:51:00.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.292893 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:51:00.662758 lvm[1267]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:51:00.724128 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:51:00.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.731245 systemd[1]: Reached target cryptsetup.target. Sep 13 00:51:00.735677 kernel: kauditd_printk_skb: 78 callbacks suppressed Sep 13 00:51:00.735767 kernel: audit: type=1130 audit(1757724660.731:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.752428 systemd[1]: Starting lvm2-activation.service... Sep 13 00:51:00.756942 lvm[1268]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:51:00.782044 systemd[1]: Finished lvm2-activation.service. Sep 13 00:51:00.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.785419 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:51:00.800139 kernel: audit: type=1130 audit(1757724660.785:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.804137 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:51:00.804177 systemd[1]: Reached target local-fs.target. Sep 13 00:51:00.807511 systemd[1]: Reached target machines.target. Sep 13 00:51:00.811667 systemd[1]: Starting ldconfig.service... Sep 13 00:51:00.848107 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:51:00.848192 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:51:00.849764 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:51:00.853259 systemd-networkd[1204]: lo: Link UP Sep 13 00:51:00.853269 systemd-networkd[1204]: lo: Gained carrier Sep 13 00:51:00.853921 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:51:00.855462 systemd-networkd[1204]: Enumeration completed Sep 13 00:51:00.857829 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:51:00.861098 systemd[1]: Starting systemd-sysext.service... Sep 13 00:51:00.863392 systemd[1]: Started systemd-networkd.service. Sep 13 00:51:00.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.866798 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:51:00.880888 kernel: audit: type=1130 audit(1757724660.865:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:00.906147 systemd-networkd[1204]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:51:00.964196 kernel: mlx5_core 64b9:00:02.0 enP25785s1: Link up Sep 13 00:51:01.010303 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:51:01.010364 kernel: hv_netvsc 6045bdc1-8898-6045-bdc1-88986045bdc1 eth0: Data path switched to VF: enP25785s1 Sep 13 00:51:00.994009 systemd-networkd[1204]: enP25785s1: Link UP Sep 13 00:51:00.994175 systemd-networkd[1204]: eth0: Link UP Sep 13 00:51:00.994180 systemd-networkd[1204]: eth0: Gained carrier Sep 13 00:51:01.000350 systemd-networkd[1204]: enP25785s1: Gained carrier Sep 13 00:51:01.009491 systemd-networkd[1204]: eth0: DHCPv4 address 10.200.4.43/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:51:01.024869 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1270 (bootctl) Sep 13 00:51:01.026311 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:51:01.059359 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:51:01.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.066949 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:51:01.077112 kernel: audit: type=1130 audit(1757724661.063:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.100833 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:51:01.101027 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:51:01.142107 kernel: loop0: detected capacity change from 0 to 221472 Sep 13 00:51:01.203112 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:51:01.206586 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:51:01.207158 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:51:01.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.224112 kernel: audit: type=1130 audit(1757724661.209:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.238105 kernel: loop1: detected capacity change from 0 to 221472 Sep 13 00:51:01.268602 (sd-sysext)[1283]: Using extensions 'kubernetes'. Sep 13 00:51:01.269046 (sd-sysext)[1283]: Merged extensions into '/usr'. Sep 13 00:51:01.284056 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:51:01.285310 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:51:01.288125 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.289567 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:51:01.292649 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:51:01.296198 systemd[1]: Starting modprobe@loop.service... Sep 13 00:51:01.298512 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.298735 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:51:01.298946 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:51:01.301566 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:51:01.304018 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:51:01.304178 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:51:01.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.306966 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:51:01.307085 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:51:01.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.320175 kernel: audit: type=1130 audit(1757724661.306:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.320232 kernel: audit: type=1131 audit(1757724661.306:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.334672 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:51:01.334804 systemd[1]: Finished modprobe@loop.service. Sep 13 00:51:01.335678 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:51:01.335788 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.350648 systemd[1]: Finished systemd-sysext.service. Sep 13 00:51:01.366599 kernel: audit: type=1130 audit(1757724661.333:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.366674 kernel: audit: type=1131 audit(1757724661.333:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.368588 systemd[1]: Starting ensure-sysext.service... Sep 13 00:51:01.380123 kernel: audit: type=1130 audit(1757724661.333:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.383148 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:51:01.388575 systemd[1]: Reloading. Sep 13 00:51:01.458619 /usr/lib/systemd/system-generators/torcx-generator[1310]: time="2025-09-13T00:51:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:51:01.469298 /usr/lib/systemd/system-generators/torcx-generator[1310]: time="2025-09-13T00:51:01Z" level=info msg="torcx already run" Sep 13 00:51:01.529309 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:51:01.529328 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:51:01.544468 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:51:01.601000 audit: BPF prog-id=30 op=LOAD Sep 13 00:51:01.601000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:51:01.602000 audit: BPF prog-id=31 op=LOAD Sep 13 00:51:01.602000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:51:01.602000 audit: BPF prog-id=32 op=LOAD Sep 13 00:51:01.602000 audit: BPF prog-id=33 op=LOAD Sep 13 00:51:01.602000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:51:01.602000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:51:01.604000 audit: BPF prog-id=34 op=LOAD Sep 13 00:51:01.604000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:51:01.604000 audit: BPF prog-id=35 op=LOAD Sep 13 00:51:01.604000 audit: BPF prog-id=36 op=LOAD Sep 13 00:51:01.604000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:51:01.604000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:51:01.605000 audit: BPF prog-id=37 op=LOAD Sep 13 00:51:01.605000 audit: BPF prog-id=38 op=LOAD Sep 13 00:51:01.605000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:51:01.605000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:51:01.617220 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:51:01.617463 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.618662 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:51:01.621117 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:51:01.625065 systemd[1]: Starting modprobe@loop.service... Sep 13 00:51:01.626135 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.626328 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:51:01.626471 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:51:01.627885 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:51:01.628061 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:51:01.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.629483 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:51:01.629596 systemd[1]: Finished modprobe@loop.service. Sep 13 00:51:01.634250 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:51:01.634400 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:51:01.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.637301 systemd[1]: Finished ensure-sysext.service. Sep 13 00:51:01.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.639122 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:51:01.639304 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.640272 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:51:01.642330 systemd[1]: Starting modprobe@drm.service... Sep 13 00:51:01.644538 systemd[1]: Starting modprobe@loop.service... Sep 13 00:51:01.647402 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.647488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:51:01.647584 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:51:01.647692 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:51:01.648213 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:51:01.648384 systemd[1]: Finished modprobe@loop.service. Sep 13 00:51:01.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:01.650044 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:51:01.650160 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:51:01.650356 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:51:01.651886 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:51:01.652011 systemd[1]: Finished modprobe@drm.service. Sep 13 00:51:01.722726 systemd-tmpfiles[1290]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:51:01.952282 systemd-tmpfiles[1290]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:51:02.264408 systemd-tmpfiles[1290]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:51:02.272259 systemd-networkd[1204]: eth0: Gained IPv6LL Sep 13 00:51:02.278860 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:51:02.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:02.342455 systemd-fsck[1279]: fsck.fat 4.2 (2021-01-31) Sep 13 00:51:02.342455 systemd-fsck[1279]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:51:02.344743 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:51:02.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:02.349547 systemd[1]: Mounting boot.mount... Sep 13 00:51:02.365008 systemd[1]: Mounted boot.mount. Sep 13 00:51:02.380971 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:51:02.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.468077 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:51:05.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.472364 systemd[1]: Starting audit-rules.service... Sep 13 00:51:05.475308 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:51:05.478379 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:51:05.481000 audit: BPF prog-id=39 op=LOAD Sep 13 00:51:05.483144 systemd[1]: Starting systemd-resolved.service... Sep 13 00:51:05.487000 audit: BPF prog-id=40 op=LOAD Sep 13 00:51:05.488183 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:51:05.491384 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:51:05.516000 audit[1388]: SYSTEM_BOOT pid=1388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.517955 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:51:05.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.558843 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:51:05.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.561505 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:51:05.652805 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:51:05.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.655847 systemd[1]: Reached target time-set.target. Sep 13 00:51:05.679546 systemd-resolved[1386]: Positive Trust Anchors: Sep 13 00:51:05.679560 systemd-resolved[1386]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:51:05.679596 systemd-resolved[1386]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:51:05.868571 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:51:05.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.875334 kernel: kauditd_printk_skb: 43 callbacks suppressed Sep 13 00:51:05.875396 kernel: audit: type=1130 audit(1757724665.871:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.917589 systemd-resolved[1386]: Using system hostname 'ci-3510.3.8-n-93bff2e88f'. Sep 13 00:51:05.919019 systemd[1]: Started systemd-resolved.service. Sep 13 00:51:05.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.921559 systemd[1]: Reached target network.target. Sep 13 00:51:05.936848 kernel: audit: type=1130 audit(1757724665.921:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:05.936867 systemd[1]: Reached target network-online.target. Sep 13 00:51:05.939301 systemd[1]: Reached target nss-lookup.target. Sep 13 00:51:05.953402 systemd-timesyncd[1387]: Contacted time server 149.22.188.7:123 (0.flatcar.pool.ntp.org). Sep 13 00:51:05.953461 systemd-timesyncd[1387]: Initial clock synchronization to Sat 2025-09-13 00:51:05.953010 UTC. Sep 13 00:51:06.004000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:51:06.005214 systemd[1]: Finished audit-rules.service. Sep 13 00:51:06.006309 augenrules[1404]: No rules Sep 13 00:51:06.004000 audit[1404]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb6c27d70 a2=420 a3=0 items=0 ppid=1383 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:06.050097 kernel: audit: type=1305 audit(1757724666.004:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:51:06.050217 kernel: audit: type=1300 audit(1757724666.004:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb6c27d70 a2=420 a3=0 items=0 ppid=1383 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:06.050250 kernel: audit: type=1327 audit(1757724666.004:214): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:51:06.004000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:51:11.283063 ldconfig[1269]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:51:11.294966 systemd[1]: Finished ldconfig.service. Sep 13 00:51:11.301128 systemd[1]: Starting systemd-update-done.service... Sep 13 00:51:11.323446 systemd[1]: Finished systemd-update-done.service. Sep 13 00:51:11.326043 systemd[1]: Reached target sysinit.target. Sep 13 00:51:11.328646 systemd[1]: Started motdgen.path. Sep 13 00:51:11.331605 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:51:11.335782 systemd[1]: Started logrotate.timer. Sep 13 00:51:11.345032 systemd[1]: Started mdadm.timer. Sep 13 00:51:11.348238 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:51:11.350392 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:51:11.350431 systemd[1]: Reached target paths.target. Sep 13 00:51:11.352176 systemd[1]: Reached target timers.target. Sep 13 00:51:11.354754 systemd[1]: Listening on dbus.socket. Sep 13 00:51:11.357887 systemd[1]: Starting docker.socket... Sep 13 00:51:11.395710 systemd[1]: Listening on sshd.socket. Sep 13 00:51:11.398182 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:51:11.398675 systemd[1]: Listening on docker.socket. Sep 13 00:51:11.400785 systemd[1]: Reached target sockets.target. Sep 13 00:51:11.402979 systemd[1]: Reached target basic.target. Sep 13 00:51:11.404890 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:51:11.404924 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:51:11.405958 systemd[1]: Starting containerd.service... Sep 13 00:51:11.409078 systemd[1]: Starting dbus.service... Sep 13 00:51:11.412142 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:51:11.415859 systemd[1]: Starting extend-filesystems.service... Sep 13 00:51:11.418386 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:51:11.434796 systemd[1]: Starting kubelet.service... Sep 13 00:51:11.437779 systemd[1]: Starting motdgen.service... Sep 13 00:51:11.442014 systemd[1]: Started nvidia.service. Sep 13 00:51:11.471942 systemd[1]: Starting prepare-helm.service... Sep 13 00:51:11.477445 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:51:11.480655 systemd[1]: Starting sshd-keygen.service... Sep 13 00:51:11.484769 systemd[1]: Starting systemd-logind.service... Sep 13 00:51:11.486865 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:51:11.486941 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:51:11.487451 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:51:11.488251 systemd[1]: Starting update-engine.service... Sep 13 00:51:11.491483 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:51:11.505450 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:51:11.505649 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:51:11.528764 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:51:11.533321 jq[1414]: false Sep 13 00:51:11.533426 jq[1428]: true Sep 13 00:51:11.528976 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:51:11.541350 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:51:11.541550 systemd[1]: Finished motdgen.service. Sep 13 00:51:11.555327 jq[1436]: true Sep 13 00:51:11.560725 extend-filesystems[1415]: Found loop1 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda1 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda2 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda3 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found usr Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda4 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda6 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda7 Sep 13 00:51:11.560725 extend-filesystems[1415]: Found sda9 Sep 13 00:51:11.560725 extend-filesystems[1415]: Checking size of /dev/sda9 Sep 13 00:51:11.605903 env[1437]: time="2025-09-13T00:51:11.605855943Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:51:11.648100 env[1437]: time="2025-09-13T00:51:11.648047824Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:51:11.648245 env[1437]: time="2025-09-13T00:51:11.648224122Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:51:11.649982 env[1437]: time="2025-09-13T00:51:11.649942796Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650073 env[1437]: time="2025-09-13T00:51:11.649982896Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650244 env[1437]: time="2025-09-13T00:51:11.650218592Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650291 env[1437]: time="2025-09-13T00:51:11.650248292Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650291 env[1437]: time="2025-09-13T00:51:11.650266992Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:51:11.650291 env[1437]: time="2025-09-13T00:51:11.650282391Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650392 env[1437]: time="2025-09-13T00:51:11.650368590Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650622 env[1437]: time="2025-09-13T00:51:11.650602887Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650786 env[1437]: time="2025-09-13T00:51:11.650762484Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:51:11.650828 env[1437]: time="2025-09-13T00:51:11.650788284Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:51:11.650869 env[1437]: time="2025-09-13T00:51:11.650841883Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:51:11.650869 env[1437]: time="2025-09-13T00:51:11.650857283Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:51:11.674967 systemd-logind[1426]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675719818Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675760118Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675779217Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675820417Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675840617Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675859616Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675877616Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675896116Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675917015Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675935915Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675954015Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.675971515Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.676072113Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:51:11.677784 env[1437]: time="2025-09-13T00:51:11.676168212Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676453208Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676480407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676498607Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676557706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676575506Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676591706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676607205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676634905Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676652105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676669704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676687204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676705204Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676821102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676839802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678280 env[1437]: time="2025-09-13T00:51:11.676856302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678744 env[1437]: time="2025-09-13T00:51:11.676872601Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:51:11.678744 env[1437]: time="2025-09-13T00:51:11.676891001Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:51:11.678744 env[1437]: time="2025-09-13T00:51:11.676906101Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:51:11.678744 env[1437]: time="2025-09-13T00:51:11.676927401Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:51:11.678744 env[1437]: time="2025-09-13T00:51:11.676965600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:51:11.678901 env[1437]: time="2025-09-13T00:51:11.677227596Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:51:11.678901 env[1437]: time="2025-09-13T00:51:11.677315895Z" level=info msg="Connect containerd service" Sep 13 00:51:11.678901 env[1437]: time="2025-09-13T00:51:11.677348594Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688286934Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688412332Z" level=info msg="Start subscribing containerd event" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688476031Z" level=info msg="Start recovering state" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688537830Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688556830Z" level=info msg="Start event monitor" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688582530Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688577530Z" level=info msg="Start snapshots syncer" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688644829Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.688657229Z" level=info msg="Start streaming server" Sep 13 00:51:11.729294 env[1437]: time="2025-09-13T00:51:11.705852376Z" level=info msg="containerd successfully booted in 0.100584s" Sep 13 00:51:11.729632 extend-filesystems[1415]: Old size kept for /dev/sda9 Sep 13 00:51:11.729632 extend-filesystems[1415]: Found sr0 Sep 13 00:51:11.686205 systemd-logind[1426]: New seat seat0. Sep 13 00:51:11.735013 tar[1431]: linux-amd64/helm Sep 13 00:51:11.688680 systemd[1]: Started containerd.service. Sep 13 00:51:11.707928 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:51:11.708156 systemd[1]: Finished extend-filesystems.service. Sep 13 00:51:11.778661 bash[1458]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:51:11.779296 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:51:11.909020 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:51:12.298966 dbus-daemon[1413]: [system] SELinux support is enabled Sep 13 00:51:12.299152 systemd[1]: Started dbus.service. Sep 13 00:51:12.303393 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:51:12.303418 systemd[1]: Reached target system-config.target. Sep 13 00:51:12.305639 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:51:12.305663 systemd[1]: Reached target user-config.target. Sep 13 00:51:12.309513 systemd[1]: Started systemd-logind.service. Sep 13 00:51:12.310615 dbus-daemon[1413]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:51:12.493890 update_engine[1427]: I0913 00:51:12.478550 1427 main.cc:92] Flatcar Update Engine starting Sep 13 00:51:12.571979 systemd[1]: Started update-engine.service. Sep 13 00:51:12.573738 update_engine[1427]: I0913 00:51:12.573639 1427 update_check_scheduler.cc:74] Next update check in 8m25s Sep 13 00:51:12.576823 systemd[1]: Started locksmithd.service. Sep 13 00:51:12.613171 tar[1431]: linux-amd64/LICENSE Sep 13 00:51:12.613804 tar[1431]: linux-amd64/README.md Sep 13 00:51:12.619634 systemd[1]: Finished prepare-helm.service. Sep 13 00:51:13.054616 systemd[1]: Started kubelet.service. Sep 13 00:51:13.217862 sshd_keygen[1435]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:51:13.244939 systemd[1]: Finished sshd-keygen.service. Sep 13 00:51:13.249065 systemd[1]: Starting issuegen.service... Sep 13 00:51:13.252296 systemd[1]: Started waagent.service. Sep 13 00:51:13.262642 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:51:13.262824 systemd[1]: Finished issuegen.service. Sep 13 00:51:13.266483 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:51:13.295729 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:51:13.300024 systemd[1]: Started getty@tty1.service. Sep 13 00:51:13.307548 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:51:13.310683 systemd[1]: Reached target getty.target. Sep 13 00:51:13.313414 systemd[1]: Reached target multi-user.target. Sep 13 00:51:13.317713 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:51:13.330364 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:51:13.330550 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:51:13.333654 systemd[1]: Startup finished in 930ms (kernel) + 14.205s (initrd) + 32.319s (userspace) = 47.455s. Sep 13 00:51:13.634661 kubelet[1516]: E0913 00:51:13.634613 1516 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:13.636141 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:13.636302 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:13.636535 systemd[1]: kubelet.service: Consumed 1.172s CPU time. Sep 13 00:51:14.125532 locksmithd[1512]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:51:14.245277 login[1538]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:51:14.246588 login[1539]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:51:14.407970 systemd[1]: Created slice user-500.slice. Sep 13 00:51:14.409422 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:51:14.412130 systemd-logind[1426]: New session 1 of user core. Sep 13 00:51:14.415189 systemd-logind[1426]: New session 2 of user core. Sep 13 00:51:14.449934 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:51:14.451881 systemd[1]: Starting user@500.service... Sep 13 00:51:14.484073 (systemd)[1545]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:14.897686 systemd[1545]: Queued start job for default target default.target. Sep 13 00:51:14.898316 systemd[1545]: Reached target paths.target. Sep 13 00:51:14.898347 systemd[1545]: Reached target sockets.target. Sep 13 00:51:14.898365 systemd[1545]: Reached target timers.target. Sep 13 00:51:14.898382 systemd[1545]: Reached target basic.target. Sep 13 00:51:14.898497 systemd[1]: Started user@500.service. Sep 13 00:51:14.899667 systemd[1]: Started session-1.scope. Sep 13 00:51:14.900373 systemd[1545]: Reached target default.target. Sep 13 00:51:14.900451 systemd[1]: Started session-2.scope. Sep 13 00:51:14.900583 systemd[1545]: Startup finished in 410ms. Sep 13 00:51:23.861694 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:51:23.861954 systemd[1]: Stopped kubelet.service. Sep 13 00:51:23.862008 systemd[1]: kubelet.service: Consumed 1.172s CPU time. Sep 13 00:51:23.863516 systemd[1]: Starting kubelet.service... Sep 13 00:51:24.629956 systemd[1]: Started kubelet.service. Sep 13 00:51:24.764680 kubelet[1571]: E0913 00:51:24.764630 1571 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:24.767796 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:24.767953 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:25.857800 waagent[1533]: 2025-09-13T00:51:25.857690Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 00:51:25.897929 waagent[1533]: 2025-09-13T00:51:25.897834Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 00:51:25.900720 waagent[1533]: 2025-09-13T00:51:25.900642Z INFO Daemon Daemon Python: 3.9.16 Sep 13 00:51:25.904187 waagent[1533]: 2025-09-13T00:51:25.904058Z INFO Daemon Daemon Run daemon Sep 13 00:51:25.907453 waagent[1533]: 2025-09-13T00:51:25.907387Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 00:51:25.934917 waagent[1533]: 2025-09-13T00:51:25.934790Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.938891Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.948191Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.949183Z INFO Daemon Daemon Using waagent for provisioning Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.952496Z INFO Daemon Daemon Activate resource disk Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.953544Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.962159Z INFO Daemon Daemon Found device: None Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.962492Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.962673Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.963731Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.964964Z INFO Daemon Daemon Running default provisioning handler Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.974859Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.977709Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.978665Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:51:25.997743 waagent[1533]: 2025-09-13T00:51:25.979556Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 00:51:26.158285 waagent[1533]: 2025-09-13T00:51:26.158128Z INFO Daemon Daemon Successfully mounted dvd Sep 13 00:51:26.264653 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 00:51:26.305649 waagent[1533]: 2025-09-13T00:51:26.305505Z INFO Daemon Daemon Detect protocol endpoint Sep 13 00:51:26.322938 waagent[1533]: 2025-09-13T00:51:26.308729Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:51:26.322938 waagent[1533]: 2025-09-13T00:51:26.310790Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 00:51:26.322938 waagent[1533]: 2025-09-13T00:51:26.311606Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 00:51:26.322938 waagent[1533]: 2025-09-13T00:51:26.312910Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 00:51:26.322938 waagent[1533]: 2025-09-13T00:51:26.313805Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 00:51:26.484306 waagent[1533]: 2025-09-13T00:51:26.484177Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 00:51:26.488121 waagent[1533]: 2025-09-13T00:51:26.488066Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 00:51:26.491121 waagent[1533]: 2025-09-13T00:51:26.491046Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 00:51:26.764998 waagent[1533]: 2025-09-13T00:51:26.764802Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 00:51:26.779096 waagent[1533]: 2025-09-13T00:51:26.779011Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 00:51:26.782824 waagent[1533]: 2025-09-13T00:51:26.782758Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 00:51:26.914182 waagent[1533]: 2025-09-13T00:51:26.914030Z INFO Daemon Daemon Found private key matching thumbprint 629425DEA1745D59DC7A1584654A32EEE816E24E Sep 13 00:51:26.921049 waagent[1533]: 2025-09-13T00:51:26.914676Z INFO Daemon Daemon Fetch goal state completed Sep 13 00:51:26.951266 waagent[1533]: 2025-09-13T00:51:26.951207Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 08452147-e8bd-427b-baf5-2906bc5b4f5e New eTag: 1058233274537067424] Sep 13 00:51:26.960305 waagent[1533]: 2025-09-13T00:51:26.951971Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:51:26.989257 waagent[1533]: 2025-09-13T00:51:26.989165Z INFO Daemon Daemon Starting provisioning Sep 13 00:51:27.002951 waagent[1533]: 2025-09-13T00:51:26.989616Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 00:51:27.002951 waagent[1533]: 2025-09-13T00:51:26.989814Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-93bff2e88f] Sep 13 00:51:27.008703 waagent[1533]: 2025-09-13T00:51:27.008579Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-93bff2e88f] Sep 13 00:51:27.020667 waagent[1533]: 2025-09-13T00:51:27.010919Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 00:51:27.020667 waagent[1533]: 2025-09-13T00:51:27.014698Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 00:51:27.028244 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 00:51:27.028479 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 00:51:27.028546 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 00:51:27.028845 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:51:27.033140 systemd-networkd[1204]: eth0: DHCPv6 lease lost Sep 13 00:51:27.034283 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:51:27.034446 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:51:27.036709 systemd[1]: Starting systemd-networkd.service... Sep 13 00:51:27.066283 systemd-networkd[1595]: enP25785s1: Link UP Sep 13 00:51:27.066294 systemd-networkd[1595]: enP25785s1: Gained carrier Sep 13 00:51:27.067620 systemd-networkd[1595]: eth0: Link UP Sep 13 00:51:27.067629 systemd-networkd[1595]: eth0: Gained carrier Sep 13 00:51:27.068066 systemd-networkd[1595]: lo: Link UP Sep 13 00:51:27.068075 systemd-networkd[1595]: lo: Gained carrier Sep 13 00:51:27.068420 systemd-networkd[1595]: eth0: Gained IPv6LL Sep 13 00:51:27.068692 systemd-networkd[1595]: Enumeration completed Sep 13 00:51:27.068804 systemd[1]: Started systemd-networkd.service. Sep 13 00:51:27.070999 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:51:27.075854 waagent[1533]: 2025-09-13T00:51:27.075673Z INFO Daemon Daemon Create user account if not exists Sep 13 00:51:27.084432 waagent[1533]: 2025-09-13T00:51:27.076365Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 00:51:27.084432 waagent[1533]: 2025-09-13T00:51:27.076557Z INFO Daemon Daemon Configure sudoer Sep 13 00:51:27.078747 systemd-networkd[1595]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:51:27.095143 systemd-networkd[1595]: eth0: DHCPv4 address 10.200.4.43/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:51:27.097437 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:51:27.098124 waagent[1533]: 2025-09-13T00:51:27.098035Z INFO Daemon Daemon Configure sshd Sep 13 00:51:27.102322 waagent[1533]: 2025-09-13T00:51:27.098366Z INFO Daemon Daemon Deploy ssh public key. Sep 13 00:51:28.243750 waagent[1533]: 2025-09-13T00:51:28.243669Z INFO Daemon Daemon Provisioning complete Sep 13 00:51:28.255629 waagent[1533]: 2025-09-13T00:51:28.255560Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 00:51:28.265616 waagent[1533]: 2025-09-13T00:51:28.258700Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 00:51:28.265616 waagent[1533]: 2025-09-13T00:51:28.262694Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 00:51:28.527121 waagent[1601]: 2025-09-13T00:51:28.526944Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 00:51:28.527854 waagent[1601]: 2025-09-13T00:51:28.527789Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:28.527997 waagent[1601]: 2025-09-13T00:51:28.527942Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:28.538518 waagent[1601]: 2025-09-13T00:51:28.538442Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 00:51:28.538688 waagent[1601]: 2025-09-13T00:51:28.538625Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 00:51:28.594696 waagent[1601]: 2025-09-13T00:51:28.594579Z INFO ExtHandler ExtHandler Found private key matching thumbprint 629425DEA1745D59DC7A1584654A32EEE816E24E Sep 13 00:51:28.594983 waagent[1601]: 2025-09-13T00:51:28.594928Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 00:51:28.607738 waagent[1601]: 2025-09-13T00:51:28.607681Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 5ad6f0c0-0ba9-4a3e-bf01-50f6e35ca7cf New eTag: 1058233274537067424] Sep 13 00:51:28.608232 waagent[1601]: 2025-09-13T00:51:28.608180Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:51:28.721821 waagent[1601]: 2025-09-13T00:51:28.721678Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:51:28.745574 waagent[1601]: 2025-09-13T00:51:28.745484Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1601 Sep 13 00:51:28.748942 waagent[1601]: 2025-09-13T00:51:28.748873Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:51:28.750083 waagent[1601]: 2025-09-13T00:51:28.750024Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 00:51:28.880260 waagent[1601]: 2025-09-13T00:51:28.880201Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:51:28.880649 waagent[1601]: 2025-09-13T00:51:28.880593Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:51:28.888323 waagent[1601]: 2025-09-13T00:51:28.888271Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:51:28.888799 waagent[1601]: 2025-09-13T00:51:28.888740Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:51:28.889833 waagent[1601]: 2025-09-13T00:51:28.889773Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 00:51:28.891066 waagent[1601]: 2025-09-13T00:51:28.891010Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:51:28.891521 waagent[1601]: 2025-09-13T00:51:28.891469Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:28.891668 waagent[1601]: 2025-09-13T00:51:28.891622Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:28.892196 waagent[1601]: 2025-09-13T00:51:28.892133Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:51:28.892978 waagent[1601]: 2025-09-13T00:51:28.892927Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:28.893234 waagent[1601]: 2025-09-13T00:51:28.893179Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:51:28.893234 waagent[1601]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:51:28.893234 waagent[1601]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:51:28.893234 waagent[1601]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:51:28.893234 waagent[1601]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:28.893234 waagent[1601]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:28.893234 waagent[1601]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:28.894716 waagent[1601]: 2025-09-13T00:51:28.894503Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:51:28.895875 waagent[1601]: 2025-09-13T00:51:28.895812Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:51:28.896191 waagent[1601]: 2025-09-13T00:51:28.896130Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:51:28.896656 waagent[1601]: 2025-09-13T00:51:28.896603Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:28.898122 waagent[1601]: 2025-09-13T00:51:28.898050Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:51:28.898432 waagent[1601]: 2025-09-13T00:51:28.898375Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:51:28.898823 waagent[1601]: 2025-09-13T00:51:28.898773Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:51:28.898999 waagent[1601]: 2025-09-13T00:51:28.898947Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:51:28.899215 waagent[1601]: 2025-09-13T00:51:28.899172Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:51:28.901810 waagent[1601]: 2025-09-13T00:51:28.901762Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:51:28.910797 waagent[1601]: 2025-09-13T00:51:28.910750Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 00:51:28.911328 waagent[1601]: 2025-09-13T00:51:28.911280Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:51:28.913559 waagent[1601]: 2025-09-13T00:51:28.913511Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 00:51:28.947488 waagent[1601]: 2025-09-13T00:51:28.947408Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 00:51:28.957709 waagent[1601]: 2025-09-13T00:51:28.957641Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1595' Sep 13 00:51:29.066740 waagent[1601]: 2025-09-13T00:51:29.066598Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:51:29.066740 waagent[1601]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:51:29.066740 waagent[1601]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:51:29.066740 waagent[1601]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:c1:88:98 brd ff:ff:ff:ff:ff:ff Sep 13 00:51:29.066740 waagent[1601]: 3: enP25785s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:c1:88:98 brd ff:ff:ff:ff:ff:ff\ altname enP25785p0s2 Sep 13 00:51:29.066740 waagent[1601]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:51:29.066740 waagent[1601]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:51:29.066740 waagent[1601]: 2: eth0 inet 10.200.4.43/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:51:29.066740 waagent[1601]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:51:29.066740 waagent[1601]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:51:29.066740 waagent[1601]: 2: eth0 inet6 fe80::6245:bdff:fec1:8898/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:51:29.245407 waagent[1601]: 2025-09-13T00:51:29.245278Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 00:51:30.267481 waagent[1533]: 2025-09-13T00:51:30.267357Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 00:51:30.272296 waagent[1533]: 2025-09-13T00:51:30.272237Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 00:51:31.490267 waagent[1629]: 2025-09-13T00:51:31.490169Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 00:51:31.490992 waagent[1629]: 2025-09-13T00:51:31.490919Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 00:51:31.491166 waagent[1629]: 2025-09-13T00:51:31.491109Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 00:51:31.491330 waagent[1629]: 2025-09-13T00:51:31.491282Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 13 00:51:31.505849 waagent[1629]: 2025-09-13T00:51:31.505744Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:51:31.506282 waagent[1629]: 2025-09-13T00:51:31.506227Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:31.506456 waagent[1629]: 2025-09-13T00:51:31.506409Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:31.506680 waagent[1629]: 2025-09-13T00:51:31.506632Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 00:51:31.517909 waagent[1629]: 2025-09-13T00:51:31.517832Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 00:51:31.531051 waagent[1629]: 2025-09-13T00:51:31.530991Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.177 Sep 13 00:51:31.531941 waagent[1629]: 2025-09-13T00:51:31.531881Z INFO ExtHandler Sep 13 00:51:31.532121 waagent[1629]: 2025-09-13T00:51:31.532059Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 946ca7b0-628d-4c66-95a6-762baf27ea6e eTag: 1058233274537067424 source: Fabric] Sep 13 00:51:31.532778 waagent[1629]: 2025-09-13T00:51:31.532724Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 00:51:31.533834 waagent[1629]: 2025-09-13T00:51:31.533776Z INFO ExtHandler Sep 13 00:51:31.533976 waagent[1629]: 2025-09-13T00:51:31.533929Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 00:51:31.539451 waagent[1629]: 2025-09-13T00:51:31.539399Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 00:51:31.539908 waagent[1629]: 2025-09-13T00:51:31.539860Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:51:31.557660 waagent[1629]: 2025-09-13T00:51:31.557602Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 00:51:31.609340 waagent[1629]: 2025-09-13T00:51:31.609222Z INFO ExtHandler Downloaded certificate {'thumbprint': '629425DEA1745D59DC7A1584654A32EEE816E24E', 'hasPrivateKey': True} Sep 13 00:51:31.610578 waagent[1629]: 2025-09-13T00:51:31.610515Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 00:51:31.611404 waagent[1629]: 2025-09-13T00:51:31.611347Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 00:51:31.629158 waagent[1629]: 2025-09-13T00:51:31.629034Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 00:51:31.638381 waagent[1629]: 2025-09-13T00:51:31.638251Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:51:31.642540 waagent[1629]: 2025-09-13T00:51:31.642398Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 00:51:31.642918 waagent[1629]: 2025-09-13T00:51:31.642822Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 00:51:31.810253 waagent[1629]: 2025-09-13T00:51:31.810048Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Sep 13 00:51:31.810253 waagent[1629]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:51:31.810253 waagent[1629]: pkts bytes target prot opt in out source destination Sep 13 00:51:31.810253 waagent[1629]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:51:31.810253 waagent[1629]: pkts bytes target prot opt in out source destination Sep 13 00:51:31.810253 waagent[1629]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:51:31.810253 waagent[1629]: pkts bytes target prot opt in out source destination Sep 13 00:51:31.810253 waagent[1629]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 00:51:31.810253 waagent[1629]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:51:31.810253 waagent[1629]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:51:31.811337 waagent[1629]: 2025-09-13T00:51:31.811271Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 00:51:31.813843 waagent[1629]: 2025-09-13T00:51:31.813740Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 00:51:31.814135 waagent[1629]: 2025-09-13T00:51:31.814061Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:51:31.814504 waagent[1629]: 2025-09-13T00:51:31.814450Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:51:31.821885 waagent[1629]: 2025-09-13T00:51:31.821828Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:51:31.822396 waagent[1629]: 2025-09-13T00:51:31.822339Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:51:31.829713 waagent[1629]: 2025-09-13T00:51:31.829642Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1629 Sep 13 00:51:31.832659 waagent[1629]: 2025-09-13T00:51:31.832592Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:51:31.833394 waagent[1629]: 2025-09-13T00:51:31.833337Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 00:51:31.834190 waagent[1629]: 2025-09-13T00:51:31.834135Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 00:51:31.836629 waagent[1629]: 2025-09-13T00:51:31.836568Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 00:51:31.836943 waagent[1629]: 2025-09-13T00:51:31.836890Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 00:51:31.838191 waagent[1629]: 2025-09-13T00:51:31.838137Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:51:31.838602 waagent[1629]: 2025-09-13T00:51:31.838546Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:31.838760 waagent[1629]: 2025-09-13T00:51:31.838715Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:31.839284 waagent[1629]: 2025-09-13T00:51:31.839236Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:51:31.839775 waagent[1629]: 2025-09-13T00:51:31.839653Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:51:31.840156 waagent[1629]: 2025-09-13T00:51:31.840073Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:51:31.840156 waagent[1629]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:51:31.840156 waagent[1629]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:51:31.840156 waagent[1629]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:51:31.840156 waagent[1629]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:31.840156 waagent[1629]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:31.840156 waagent[1629]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:31.842314 waagent[1629]: 2025-09-13T00:51:31.842119Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:31.842728 waagent[1629]: 2025-09-13T00:51:31.842664Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:31.843964 waagent[1629]: 2025-09-13T00:51:31.843894Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:51:31.844409 waagent[1629]: 2025-09-13T00:51:31.844358Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:51:31.844837 waagent[1629]: 2025-09-13T00:51:31.844785Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:51:31.845162 waagent[1629]: 2025-09-13T00:51:31.845101Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:51:31.847258 waagent[1629]: 2025-09-13T00:51:31.847011Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:51:31.849137 waagent[1629]: 2025-09-13T00:51:31.849065Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:51:31.851295 waagent[1629]: 2025-09-13T00:51:31.851164Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:51:31.858182 waagent[1629]: 2025-09-13T00:51:31.855963Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:51:31.864607 waagent[1629]: 2025-09-13T00:51:31.864489Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:51:31.864607 waagent[1629]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:51:31.864607 waagent[1629]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:51:31.864607 waagent[1629]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:c1:88:98 brd ff:ff:ff:ff:ff:ff Sep 13 00:51:31.864607 waagent[1629]: 3: enP25785s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:c1:88:98 brd ff:ff:ff:ff:ff:ff\ altname enP25785p0s2 Sep 13 00:51:31.864607 waagent[1629]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:51:31.864607 waagent[1629]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:51:31.864607 waagent[1629]: 2: eth0 inet 10.200.4.43/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:51:31.864607 waagent[1629]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:51:31.864607 waagent[1629]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:51:31.864607 waagent[1629]: 2: eth0 inet6 fe80::6245:bdff:fec1:8898/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:51:31.873289 waagent[1629]: 2025-09-13T00:51:31.873217Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 00:51:31.902510 waagent[1629]: 2025-09-13T00:51:31.902436Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:51:31.904353 waagent[1629]: 2025-09-13T00:51:31.904294Z INFO ExtHandler ExtHandler Sep 13 00:51:31.904746 waagent[1629]: 2025-09-13T00:51:31.904696Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d3f2c766-f719-4ca4-8a2c-1a057d4331a3 correlation d56e1da8-5200-4888-9f67-bd63a992e88a created: 2025-09-13T00:49:45.365417Z] Sep 13 00:51:31.919658 waagent[1629]: 2025-09-13T00:51:31.919415Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 00:51:31.923045 waagent[1629]: 2025-09-13T00:51:31.922988Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 18 ms] Sep 13 00:51:31.927401 waagent[1629]: 2025-09-13T00:51:31.927348Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 00:51:31.955407 waagent[1629]: 2025-09-13T00:51:31.955344Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 00:51:31.958546 waagent[1629]: 2025-09-13T00:51:31.958484Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 5103470D-700A-4C02-A07E-33D77827EF21;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 00:51:32.290457 systemd[1]: Created slice system-sshd.slice. Sep 13 00:51:32.292215 systemd[1]: Started sshd@0-10.200.4.43:22-10.200.16.10:60986.service. Sep 13 00:51:33.145228 sshd[1677]: Accepted publickey for core from 10.200.16.10 port 60986 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:33.146529 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:33.149948 systemd-logind[1426]: New session 3 of user core. Sep 13 00:51:33.151112 systemd[1]: Started session-3.scope. Sep 13 00:51:33.654281 systemd[1]: Started sshd@1-10.200.4.43:22-10.200.16.10:60990.service. Sep 13 00:51:34.234677 sshd[1682]: Accepted publickey for core from 10.200.16.10 port 60990 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:34.235961 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:34.240419 systemd[1]: Started session-4.scope. Sep 13 00:51:34.240959 systemd-logind[1426]: New session 4 of user core. Sep 13 00:51:34.657183 sshd[1682]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:34.659742 systemd[1]: sshd@1-10.200.4.43:22-10.200.16.10:60990.service: Deactivated successfully. Sep 13 00:51:34.660578 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:51:34.661201 systemd-logind[1426]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:51:34.661893 systemd-logind[1426]: Removed session 4. Sep 13 00:51:34.754678 systemd[1]: Started sshd@2-10.200.4.43:22-10.200.16.10:60992.service. Sep 13 00:51:34.861717 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:51:34.861942 systemd[1]: Stopped kubelet.service. Sep 13 00:51:34.863483 systemd[1]: Starting kubelet.service... Sep 13 00:51:34.954225 systemd[1]: Started kubelet.service. Sep 13 00:51:35.335444 sshd[1688]: Accepted publickey for core from 10.200.16.10 port 60992 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:35.336808 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:35.341198 systemd[1]: Started session-5.scope. Sep 13 00:51:35.341745 systemd-logind[1426]: New session 5 of user core. Sep 13 00:51:35.678454 kubelet[1694]: E0913 00:51:35.678405 1694 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:35.680060 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:35.680293 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:35.750519 sshd[1688]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:35.753076 systemd[1]: sshd@2-10.200.4.43:22-10.200.16.10:60992.service: Deactivated successfully. Sep 13 00:51:35.754072 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:51:35.754122 systemd-logind[1426]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:51:35.754979 systemd-logind[1426]: Removed session 5. Sep 13 00:51:35.847635 systemd[1]: Started sshd@3-10.200.4.43:22-10.200.16.10:32770.service. Sep 13 00:51:36.431848 sshd[1704]: Accepted publickey for core from 10.200.16.10 port 32770 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:36.433128 sshd[1704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:36.437575 systemd[1]: Started session-6.scope. Sep 13 00:51:36.438002 systemd-logind[1426]: New session 6 of user core. Sep 13 00:51:36.849207 sshd[1704]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:36.851636 systemd[1]: sshd@3-10.200.4.43:22-10.200.16.10:32770.service: Deactivated successfully. Sep 13 00:51:36.852397 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:51:36.852995 systemd-logind[1426]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:51:36.853706 systemd-logind[1426]: Removed session 6. Sep 13 00:51:36.946048 systemd[1]: Started sshd@4-10.200.4.43:22-10.200.16.10:32776.service. Sep 13 00:51:37.526181 sshd[1710]: Accepted publickey for core from 10.200.16.10 port 32776 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:37.527574 sshd[1710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:37.532131 systemd[1]: Started session-7.scope. Sep 13 00:51:37.532552 systemd-logind[1426]: New session 7 of user core. Sep 13 00:51:38.231627 sudo[1713]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:51:38.232117 sudo[1713]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:38.262300 dbus-daemon[1413]: \xd0\u001d\xba\xa0~U: received setenforce notice (enforcing=302491664) Sep 13 00:51:38.263988 sudo[1713]: pam_unix(sudo:session): session closed for user root Sep 13 00:51:38.382403 sshd[1710]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:38.385481 systemd[1]: sshd@4-10.200.4.43:22-10.200.16.10:32776.service: Deactivated successfully. Sep 13 00:51:38.386443 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:51:38.387198 systemd-logind[1426]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:51:38.388223 systemd-logind[1426]: Removed session 7. Sep 13 00:51:38.479020 systemd[1]: Started sshd@5-10.200.4.43:22-10.200.16.10:32778.service. Sep 13 00:51:39.060825 sshd[1717]: Accepted publickey for core from 10.200.16.10 port 32778 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:39.062445 sshd[1717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:39.069069 systemd[1]: Started session-8.scope. Sep 13 00:51:39.069495 systemd-logind[1426]: New session 8 of user core. Sep 13 00:51:39.384345 sudo[1721]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:51:39.384640 sudo[1721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:39.387247 sudo[1721]: pam_unix(sudo:session): session closed for user root Sep 13 00:51:39.391468 sudo[1720]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:51:39.391745 sudo[1720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:39.399845 systemd[1]: Stopping audit-rules.service... Sep 13 00:51:39.400000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:51:39.404248 auditctl[1724]: No rules Sep 13 00:51:39.400000 audit[1724]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7c45a9c0 a2=420 a3=0 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:39.407440 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:51:39.407634 systemd[1]: Stopped audit-rules.service. Sep 13 00:51:39.409453 systemd[1]: Starting audit-rules.service... Sep 13 00:51:39.426931 kernel: audit: type=1305 audit(1757724699.400:215): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:51:39.427020 kernel: audit: type=1300 audit(1757724699.400:215): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7c45a9c0 a2=420 a3=0 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:39.427459 kernel: audit: type=1327 audit(1757724699.400:215): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:51:39.400000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:51:39.433114 kernel: audit: type=1131 audit(1757724699.406:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.437355 augenrules[1741]: No rules Sep 13 00:51:39.437790 systemd[1]: Finished audit-rules.service. Sep 13 00:51:39.438669 sudo[1720]: pam_unix(sudo:session): session closed for user root Sep 13 00:51:39.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.448104 kernel: audit: type=1130 audit(1757724699.435:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.435000 audit[1720]: USER_END pid=1720 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.476652 kernel: audit: type=1106 audit(1757724699.435:218): pid=1720 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.477151 kernel: audit: type=1104 audit(1757724699.435:219): pid=1720 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.435000 audit[1720]: CRED_DISP pid=1720 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.533134 sshd[1717]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:39.533000 audit[1717]: USER_END pid=1717 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:39.535980 systemd[1]: sshd@5-10.200.4.43:22-10.200.16.10:32778.service: Deactivated successfully. Sep 13 00:51:39.538425 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:51:39.539495 systemd-logind[1426]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:51:39.540356 systemd-logind[1426]: Removed session 8. Sep 13 00:51:39.533000 audit[1717]: CRED_DISP pid=1717 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:39.570129 kernel: audit: type=1106 audit(1757724699.533:220): pid=1717 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:39.570187 kernel: audit: type=1104 audit(1757724699.533:221): pid=1717 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:39.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.43:22-10.200.16.10:32778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.592130 kernel: audit: type=1131 audit(1757724699.536:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.43:22-10.200.16.10:32778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.665931 systemd[1]: Started sshd@6-10.200.4.43:22-10.200.16.10:32794.service. Sep 13 00:51:39.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.43:22-10.200.16.10:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:40.242000 audit[1747]: USER_ACCT pid=1747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:40.244285 sshd[1747]: Accepted publickey for core from 10.200.16.10 port 32794 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:40.244000 audit[1747]: CRED_ACQ pid=1747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:40.244000 audit[1747]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe68c3ff70 a2=3 a3=0 items=0 ppid=1 pid=1747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.244000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:51:40.245637 sshd[1747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:40.250650 systemd[1]: Started session-9.scope. Sep 13 00:51:40.251075 systemd-logind[1426]: New session 9 of user core. Sep 13 00:51:40.255000 audit[1747]: USER_START pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:40.256000 audit[1749]: CRED_ACQ pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:40.564000 audit[1750]: USER_ACCT pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:40.564000 audit[1750]: CRED_REFR pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:40.565473 sudo[1750]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:51:40.565765 sudo[1750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:40.566000 audit[1750]: USER_START pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:40.604982 systemd[1]: Starting docker.service... Sep 13 00:51:40.659336 env[1760]: time="2025-09-13T00:51:40.659284427Z" level=info msg="Starting up" Sep 13 00:51:40.660451 env[1760]: time="2025-09-13T00:51:40.660430425Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:51:40.660542 env[1760]: time="2025-09-13T00:51:40.660532325Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:51:40.660603 env[1760]: time="2025-09-13T00:51:40.660591325Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:51:40.660644 env[1760]: time="2025-09-13T00:51:40.660635824Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:51:40.662397 env[1760]: time="2025-09-13T00:51:40.662379320Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:51:40.662479 env[1760]: time="2025-09-13T00:51:40.662470120Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:51:40.662525 env[1760]: time="2025-09-13T00:51:40.662516420Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:51:40.662561 env[1760]: time="2025-09-13T00:51:40.662554320Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:51:40.670173 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4053900659-merged.mount: Deactivated successfully. Sep 13 00:51:40.739047 env[1760]: time="2025-09-13T00:51:40.739010748Z" level=info msg="Loading containers: start." Sep 13 00:51:40.810000 audit[1788]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.810000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd58f29fd0 a2=0 a3=7ffd58f29fbc items=0 ppid=1760 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.810000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 13 00:51:40.812000 audit[1790]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.812000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff15823620 a2=0 a3=7fff1582360c items=0 ppid=1760 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.812000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 13 00:51:40.814000 audit[1792]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.814000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe52ea86d0 a2=0 a3=7ffe52ea86bc items=0 ppid=1760 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:51:40.816000 audit[1794]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.816000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff4f53f100 a2=0 a3=7fff4f53f0ec items=0 ppid=1760 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:51:40.818000 audit[1796]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.818000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedad17950 a2=0 a3=7ffedad1793c items=0 ppid=1760 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 13 00:51:40.820000 audit[1798]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.820000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0de76810 a2=0 a3=7ffd0de767fc items=0 ppid=1760 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 13 00:51:40.838000 audit[1800]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.838000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd431baa20 a2=0 a3=7ffd431baa0c items=0 ppid=1760 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 13 00:51:40.841000 audit[1802]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.841000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffff65e37e0 a2=0 a3=7ffff65e37cc items=0 ppid=1760 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 13 00:51:40.845000 audit[1804]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.845000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd7baab2e0 a2=0 a3=7ffd7baab2cc items=0 ppid=1760 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:40.861000 audit[1808]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.861000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe2e532d70 a2=0 a3=7ffe2e532d5c items=0 ppid=1760 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.861000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:40.865000 audit[1809]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:40.865000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdb8386e90 a2=0 a3=7ffdb8386e7c items=0 ppid=1760 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:40.865000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:40.951116 kernel: Initializing XFRM netlink socket Sep 13 00:51:40.987666 env[1760]: time="2025-09-13T00:51:40.987633587Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 13 00:51:41.106000 audit[1817]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.106000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcdd96ab60 a2=0 a3=7ffcdd96ab4c items=0 ppid=1760 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 13 00:51:41.160000 audit[1820]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.160000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe700cc610 a2=0 a3=7ffe700cc5fc items=0 ppid=1760 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.160000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 13 00:51:41.163000 audit[1823]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.163000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe74d8c450 a2=0 a3=7ffe74d8c43c items=0 ppid=1760 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 13 00:51:41.165000 audit[1825]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.165000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd18a2e680 a2=0 a3=7ffd18a2e66c items=0 ppid=1760 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 13 00:51:41.167000 audit[1827]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.167000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff9b2efc00 a2=0 a3=7fff9b2efbec items=0 ppid=1760 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 13 00:51:41.169000 audit[1829]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.169000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd5fb22d00 a2=0 a3=7ffd5fb22cec items=0 ppid=1760 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 13 00:51:41.171000 audit[1831]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.171000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe679ba5b0 a2=0 a3=7ffe679ba59c items=0 ppid=1760 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 13 00:51:41.173000 audit[1833]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.173000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc01b51050 a2=0 a3=7ffc01b5103c items=0 ppid=1760 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.173000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 13 00:51:41.175000 audit[1835]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.175000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd06094250 a2=0 a3=7ffd0609423c items=0 ppid=1760 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:51:41.177000 audit[1837]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.177000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff7eb2da80 a2=0 a3=7fff7eb2da6c items=0 ppid=1760 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:51:41.179000 audit[1839]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.179000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9cf30310 a2=0 a3=7fff9cf302fc items=0 ppid=1760 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 13 00:51:41.180995 systemd-networkd[1595]: docker0: Link UP Sep 13 00:51:41.195000 audit[1843]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.195000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf9cab870 a2=0 a3=7ffdf9cab85c items=0 ppid=1760 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:41.200000 audit[1844]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:41.200000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe2b7f6160 a2=0 a3=7ffe2b7f614c items=0 ppid=1760 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:41.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:41.202271 env[1760]: time="2025-09-13T00:51:41.202242031Z" level=info msg="Loading containers: done." Sep 13 00:51:41.262969 env[1760]: time="2025-09-13T00:51:41.262923602Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 13 00:51:41.263204 env[1760]: time="2025-09-13T00:51:41.263155902Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 13 00:51:41.263300 env[1760]: time="2025-09-13T00:51:41.263276101Z" level=info msg="Daemon has completed initialization" Sep 13 00:51:41.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:41.288667 systemd[1]: Started docker.service. Sep 13 00:51:41.292510 env[1760]: time="2025-09-13T00:51:41.292463340Z" level=info msg="API listen on /run/docker.sock" Sep 13 00:51:45.269444 env[1437]: time="2025-09-13T00:51:45.269396314Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.13\"" Sep 13 00:51:45.866962 kernel: kauditd_printk_skb: 84 callbacks suppressed Sep 13 00:51:45.867068 kernel: audit: type=1130 audit(1757724705.861:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:45.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:45.861893 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 00:51:45.862133 systemd[1]: Stopped kubelet.service. Sep 13 00:51:45.866572 systemd[1]: Starting kubelet.service... Sep 13 00:51:45.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:45.889129 kernel: audit: type=1131 audit(1757724705.861:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:46.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:46.152941 systemd[1]: Started kubelet.service. Sep 13 00:51:46.165138 kernel: audit: type=1130 audit(1757724706.152:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:46.716250 kubelet[1880]: E0913 00:51:46.716216 1880 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:46.755579 kernel: audit: type=1131 audit(1757724706.716:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:46.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:46.717704 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:46.717821 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:46.841698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3732091019.mount: Deactivated successfully. Sep 13 00:51:47.953115 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 13 00:51:48.614886 env[1437]: time="2025-09-13T00:51:48.614838023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.619174 env[1437]: time="2025-09-13T00:51:48.619138617Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:368da3301bb03f4bef9f7dc2084f5fc5954b0ac1bf1e49ca502e3a7604011e54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.622950 env[1437]: time="2025-09-13T00:51:48.622917712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.626055 env[1437]: time="2025-09-13T00:51:48.626023108Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:9abeb8a2d3e53e356d1f2e5d5dc2081cf28f23242651b0552c9e38f4a7ae960e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.626714 env[1437]: time="2025-09-13T00:51:48.626677007Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.13\" returns image reference \"sha256:368da3301bb03f4bef9f7dc2084f5fc5954b0ac1bf1e49ca502e3a7604011e54\"" Sep 13 00:51:48.627362 env[1437]: time="2025-09-13T00:51:48.627333406Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.13\"" Sep 13 00:51:50.450902 env[1437]: time="2025-09-13T00:51:50.450849008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:50.455252 env[1437]: time="2025-09-13T00:51:50.455211803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbd19105c6bcbedf394f51c8bb963def5195c300fc7d04bc39d48d14d23c0ff0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:50.459594 env[1437]: time="2025-09-13T00:51:50.459559898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:50.462670 env[1437]: time="2025-09-13T00:51:50.462637194Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:facc91288697a288a691520949fe4eec40059ef065c89da8e10481d14e131b09,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:50.463298 env[1437]: time="2025-09-13T00:51:50.463266594Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.13\" returns image reference \"sha256:cbd19105c6bcbedf394f51c8bb963def5195c300fc7d04bc39d48d14d23c0ff0\"" Sep 13 00:51:50.464269 env[1437]: time="2025-09-13T00:51:50.464241892Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.13\"" Sep 13 00:51:50.878756 env[1437]: time="2025-09-13T00:51:50.878675302Z" level=error msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.13\" failed" error="failed to pull and unpack image \"registry.k8s.io/kube-scheduler:v1.31.13\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-eu-west-1.s3.dualstack.eu-west-1.amazonaws.com/containers/images/sha256:d019d989e2b1f0b08ea7eebd4dd7673bdd6ba2218a3c5a6bd53f6848d5fc1af6\": dial tcp: lookup prod-registry-k8s-io-eu-west-1.s3.dualstack.eu-west-1.amazonaws.com: no such host" Sep 13 00:51:50.879219 env[1437]: time="2025-09-13T00:51:50.879194501Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.13\"" Sep 13 00:51:52.266960 env[1437]: time="2025-09-13T00:51:52.266879471Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.272972 env[1437]: time="2025-09-13T00:51:52.272935265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d019d989e2b1f0b08ea7eebd4dd7673bdd6ba2218a3c5a6bd53f6848d5fc1af6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.276865 env[1437]: time="2025-09-13T00:51:52.276833761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.280219 env[1437]: time="2025-09-13T00:51:52.280150357Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c5ce150dcce2419fdef9f9875fef43014355ccebf937846ed3a2971953f9b241,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.281263 env[1437]: time="2025-09-13T00:51:52.281229156Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.13\" returns image reference \"sha256:d019d989e2b1f0b08ea7eebd4dd7673bdd6ba2218a3c5a6bd53f6848d5fc1af6\"" Sep 13 00:51:52.281894 env[1437]: time="2025-09-13T00:51:52.281868655Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\"" Sep 13 00:51:53.696780 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1631233353.mount: Deactivated successfully. Sep 13 00:51:54.376821 env[1437]: time="2025-09-13T00:51:54.376769288Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:54.380921 env[1437]: time="2025-09-13T00:51:54.380872284Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:54.384889 env[1437]: time="2025-09-13T00:51:54.384851381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:54.388770 env[1437]: time="2025-09-13T00:51:54.388738177Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:54.389201 env[1437]: time="2025-09-13T00:51:54.389171877Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\" returns image reference \"sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7\"" Sep 13 00:51:54.389884 env[1437]: time="2025-09-13T00:51:54.389861976Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Sep 13 00:51:55.000780 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount78435467.mount: Deactivated successfully. Sep 13 00:51:56.389530 env[1437]: time="2025-09-13T00:51:56.389479348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:56.395862 env[1437]: time="2025-09-13T00:51:56.395823743Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:56.399026 env[1437]: time="2025-09-13T00:51:56.398981640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:56.401979 env[1437]: time="2025-09-13T00:51:56.401951238Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:56.402625 env[1437]: time="2025-09-13T00:51:56.402596138Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Sep 13 00:51:56.403151 env[1437]: time="2025-09-13T00:51:56.403128937Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 13 00:51:56.880111 kernel: audit: type=1130 audit(1757724716.860:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:56.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:56.861717 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 00:51:56.861901 systemd[1]: Stopped kubelet.service. Sep 13 00:51:56.863264 systemd[1]: Starting kubelet.service... Sep 13 00:51:56.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:56.897290 kernel: audit: type=1131 audit(1757724716.860:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:57.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:57.525887 systemd[1]: Started kubelet.service. Sep 13 00:51:57.543147 kernel: audit: type=1130 audit(1757724717.525:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:57.690841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2647124386.mount: Deactivated successfully. Sep 13 00:51:57.696727 kubelet[1891]: E0913 00:51:57.696686 1891 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:57.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:57.698081 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:57.698225 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:57.714119 kernel: audit: type=1131 audit(1757724717.697:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:57.722462 env[1437]: time="2025-09-13T00:51:57.722427113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:57.728400 env[1437]: time="2025-09-13T00:51:57.728339508Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:57.732631 env[1437]: time="2025-09-13T00:51:57.732599405Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:57.735983 env[1437]: time="2025-09-13T00:51:57.735956602Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:57.736401 env[1437]: time="2025-09-13T00:51:57.736369402Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 13 00:51:57.737023 env[1437]: time="2025-09-13T00:51:57.737000602Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Sep 13 00:51:57.883398 update_engine[1427]: I0913 00:51:57.883366 1427 update_attempter.cc:509] Updating boot flags... Sep 13 00:51:58.375367 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2239788554.mount: Deactivated successfully. Sep 13 00:52:01.472204 env[1437]: time="2025-09-13T00:52:01.472159940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:01.479124 env[1437]: time="2025-09-13T00:52:01.479075835Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:01.485976 env[1437]: time="2025-09-13T00:52:01.485938931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:01.489493 env[1437]: time="2025-09-13T00:52:01.489461529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:01.490169 env[1437]: time="2025-09-13T00:52:01.490134229Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Sep 13 00:52:04.084022 systemd[1]: Stopped kubelet.service. Sep 13 00:52:04.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.086665 systemd[1]: Starting kubelet.service... Sep 13 00:52:04.102107 kernel: audit: type=1130 audit(1757724724.083:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.102182 kernel: audit: type=1131 audit(1757724724.083:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.144965 systemd[1]: Reloading. Sep 13 00:52:04.253003 /usr/lib/systemd/system-generators/torcx-generator[2007]: time="2025-09-13T00:52:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:52:04.253040 /usr/lib/systemd/system-generators/torcx-generator[2007]: time="2025-09-13T00:52:04Z" level=info msg="torcx already run" Sep 13 00:52:04.339224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:52:04.339245 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:52:04.353961 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.432003 kernel: audit: type=1400 audit(1757724724.413:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.432079 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:52:04.451679 kernel: audit: type=1400 audit(1757724724.413:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.451778 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.472316 kernel: audit: type=1400 audit(1757724724.413:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.472415 kernel: audit: backlog limit exceeded Sep 13 00:52:04.472443 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495359 kernel: audit: type=1400 audit(1757724724.413:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.413000 audit: BPF prog-id=47 op=LOAD Sep 13 00:52:04.413000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit: BPF prog-id=48 op=LOAD Sep 13 00:52:04.428000 audit: BPF prog-id=46 op=UNLOAD Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit: BPF prog-id=49 op=LOAD Sep 13 00:52:04.429000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit: BPF prog-id=50 op=LOAD Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.429000 audit: BPF prog-id=51 op=LOAD Sep 13 00:52:04.429000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:52:04.429000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.456000 audit: BPF prog-id=52 op=LOAD Sep 13 00:52:04.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit: BPF prog-id=54 op=LOAD Sep 13 00:52:04.495000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.495000 audit: BPF prog-id=55 op=LOAD Sep 13 00:52:04.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.496000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit: BPF prog-id=57 op=LOAD Sep 13 00:52:04.498000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit: BPF prog-id=58 op=LOAD Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.498000 audit: BPF prog-id=59 op=LOAD Sep 13 00:52:04.498000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:52:04.498000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit: BPF prog-id=60 op=LOAD Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:04.499000 audit: BPF prog-id=61 op=LOAD Sep 13 00:52:04.499000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:52:04.499000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:52:04.520757 systemd[1]: Started kubelet.service. Sep 13 00:52:04.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.523385 systemd[1]: Stopping kubelet.service... Sep 13 00:52:04.523735 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:52:04.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.523948 systemd[1]: Stopped kubelet.service. Sep 13 00:52:04.525541 systemd[1]: Starting kubelet.service... Sep 13 00:52:04.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:04.909486 systemd[1]: Started kubelet.service. Sep 13 00:52:04.945780 kubelet[2078]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:04.945780 kubelet[2078]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 00:52:04.945780 kubelet[2078]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:04.946243 kubelet[2078]: I0913 00:52:04.945861 2078 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:52:05.725069 kubelet[2078]: I0913 00:52:05.725029 2078 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 00:52:05.725069 kubelet[2078]: I0913 00:52:05.725059 2078 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:52:05.725916 kubelet[2078]: I0913 00:52:05.725437 2078 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 00:52:05.865433 kubelet[2078]: E0913 00:52:05.865390 2078 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.43:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:05.871114 kubelet[2078]: I0913 00:52:05.870524 2078 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:52:05.880823 kubelet[2078]: E0913 00:52:05.880785 2078 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:52:05.880823 kubelet[2078]: I0913 00:52:05.880823 2078 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:52:05.886656 kubelet[2078]: I0913 00:52:05.886631 2078 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:52:05.887589 kubelet[2078]: I0913 00:52:05.887561 2078 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 00:52:05.887734 kubelet[2078]: I0913 00:52:05.887706 2078 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:52:05.887905 kubelet[2078]: I0913 00:52:05.887734 2078 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.8-n-93bff2e88f","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:52:05.888113 kubelet[2078]: I0913 00:52:05.887914 2078 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:52:05.888113 kubelet[2078]: I0913 00:52:05.887925 2078 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 00:52:05.888188 kubelet[2078]: I0913 00:52:05.888140 2078 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:05.895693 kubelet[2078]: I0913 00:52:05.895658 2078 kubelet.go:408] "Attempting to sync node with API server" Sep 13 00:52:05.895693 kubelet[2078]: I0913 00:52:05.895696 2078 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:52:05.895874 kubelet[2078]: I0913 00:52:05.895740 2078 kubelet.go:314] "Adding apiserver pod source" Sep 13 00:52:05.895874 kubelet[2078]: I0913 00:52:05.895763 2078 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:52:05.907076 kubelet[2078]: W0913 00:52:05.907042 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-93bff2e88f&limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:05.907310 kubelet[2078]: E0913 00:52:05.907286 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-93bff2e88f&limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:05.907473 kubelet[2078]: I0913 00:52:05.907460 2078 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:52:05.908012 kubelet[2078]: I0913 00:52:05.907997 2078 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:52:05.908148 kubelet[2078]: W0913 00:52:05.908138 2078 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:52:05.915777 kubelet[2078]: I0913 00:52:05.915758 2078 server.go:1274] "Started kubelet" Sep 13 00:52:05.916959 kubelet[2078]: W0913 00:52:05.916798 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.43:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:05.916959 kubelet[2078]: E0913 00:52:05.916868 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.43:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:05.916959 kubelet[2078]: I0913 00:52:05.916916 2078 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:52:05.918000 audit[2078]: AVC avc: denied { mac_admin } for pid=2078 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:05.918000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:05.918000 audit[2078]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b00540 a1=c000978ca8 a2=c000b00510 a3=25 items=0 ppid=1 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.918000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:05.918000 audit[2078]: AVC avc: denied { mac_admin } for pid=2078 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:05.918000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:05.918000 audit[2078]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009397a0 a1=c000978cc0 a2=c000b005d0 a3=25 items=0 ppid=1 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.918000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:05.919847 kubelet[2078]: I0913 00:52:05.919345 2078 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:52:05.919847 kubelet[2078]: I0913 00:52:05.919400 2078 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 00:52:05.919847 kubelet[2078]: I0913 00:52:05.919462 2078 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:52:05.921311 kubelet[2078]: I0913 00:52:05.921280 2078 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:52:05.921643 kubelet[2078]: I0913 00:52:05.921627 2078 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:52:05.921000 audit[2089]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.921000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc98295f40 a2=0 a3=7ffc98295f2c items=0 ppid=2078 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:52:05.922000 audit[2090]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.922000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc66992700 a2=0 a3=7ffc669926ec items=0 ppid=2078 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:52:05.925382 kubelet[2078]: I0913 00:52:05.925357 2078 server.go:449] "Adding debug handlers to kubelet server" Sep 13 00:52:05.926950 kubelet[2078]: E0913 00:52:05.925142 2078 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.43:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.43:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.8-n-93bff2e88f.1864b1534d20c1ce default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.8-n-93bff2e88f,UID:ci-3510.3.8-n-93bff2e88f,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.8-n-93bff2e88f,},FirstTimestamp:2025-09-13 00:52:05.915730382 +0000 UTC m=+1.002340047,LastTimestamp:2025-09-13 00:52:05.915730382 +0000 UTC m=+1.002340047,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.8-n-93bff2e88f,}" Sep 13 00:52:05.927107 kubelet[2078]: I0913 00:52:05.927074 2078 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:52:05.928456 kubelet[2078]: I0913 00:52:05.928441 2078 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 00:52:05.928793 kubelet[2078]: E0913 00:52:05.928777 2078 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-93bff2e88f\" not found" Sep 13 00:52:05.930225 kubelet[2078]: E0913 00:52:05.930171 2078 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-93bff2e88f?timeout=10s\": dial tcp 10.200.4.43:6443: connect: connection refused" interval="200ms" Sep 13 00:52:05.930433 kubelet[2078]: I0913 00:52:05.930417 2078 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:52:05.930509 kubelet[2078]: I0913 00:52:05.930492 2078 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:52:05.929000 audit[2092]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.929000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffbd68e720 a2=0 a3=7fffbd68e70c items=0 ppid=2078 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:05.932517 kubelet[2078]: I0913 00:52:05.932234 2078 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 00:52:05.932517 kubelet[2078]: I0913 00:52:05.932295 2078 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:52:05.932989 kubelet[2078]: I0913 00:52:05.932976 2078 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:52:05.934000 audit[2094]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.934000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6302b320 a2=0 a3=7fff6302b30c items=0 ppid=2078 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:05.938015 kubelet[2078]: E0913 00:52:05.937990 2078 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:52:05.945628 kubelet[2078]: W0913 00:52:05.945579 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:05.945746 kubelet[2078]: E0913 00:52:05.945643 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:05.964655 kubelet[2078]: I0913 00:52:05.964632 2078 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 00:52:05.965002 kubelet[2078]: I0913 00:52:05.964989 2078 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 00:52:05.965058 kubelet[2078]: I0913 00:52:05.965050 2078 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:05.970000 audit[2100]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.970000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd4f38dec0 a2=0 a3=7ffd4f38deac items=0 ppid=2078 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:52:05.972196 kubelet[2078]: I0913 00:52:05.972152 2078 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:52:05.972641 kubelet[2078]: I0913 00:52:05.972622 2078 policy_none.go:49] "None policy: Start" Sep 13 00:52:05.973324 kubelet[2078]: I0913 00:52:05.973308 2078 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 00:52:05.973399 kubelet[2078]: I0913 00:52:05.973358 2078 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:52:05.973000 audit[2102]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.973000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6ff211d0 a2=0 a3=7ffd6ff211bc items=0 ppid=2078 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:52:05.973000 audit[2103]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:05.973000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee0a4c480 a2=0 a3=7ffee0a4c46c items=0 ppid=2078 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:52:05.975062 kubelet[2078]: I0913 00:52:05.975046 2078 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:52:05.977469 kubelet[2078]: I0913 00:52:05.975069 2078 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 00:52:05.977469 kubelet[2078]: I0913 00:52:05.975137 2078 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 00:52:05.977469 kubelet[2078]: E0913 00:52:05.975181 2078 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:52:05.977469 kubelet[2078]: W0913 00:52:05.976918 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:05.977469 kubelet[2078]: E0913 00:52:05.976994 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:05.977000 audit[2106]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:05.977000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2820f1b0 a2=0 a3=7ffc2820f19c items=0 ppid=2078 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:52:05.978000 audit[2107]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.978000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe37a66d0 a2=0 a3=7fffe37a66bc items=0 ppid=2078 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:52:05.980000 audit[2109]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:05.980000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf3bce960 a2=0 a3=7ffcf3bce94c items=0 ppid=2078 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:52:05.981000 audit[2108]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:05.981000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff4e533600 a2=0 a3=7fff4e5335ec items=0 ppid=2078 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:52:05.983176 systemd[1]: Created slice kubepods.slice. Sep 13 00:52:05.986000 audit[2110]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:05.986000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf0f7dfe0 a2=0 a3=7ffdf0f7dfcc items=0 ppid=2078 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:52:05.987762 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:52:05.993901 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:52:05.997107 kubelet[2078]: I0913 00:52:05.997074 2078 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:52:05.996000 audit[2078]: AVC avc: denied { mac_admin } for pid=2078 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:05.996000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:05.996000 audit[2078]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ee6f90 a1=c000eeab10 a2=c000ee6f60 a3=25 items=0 ppid=1 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:05.996000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:05.997409 kubelet[2078]: I0913 00:52:05.997173 2078 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:52:05.997409 kubelet[2078]: I0913 00:52:05.997295 2078 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:52:05.997409 kubelet[2078]: I0913 00:52:05.997308 2078 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:52:05.999237 kubelet[2078]: I0913 00:52:05.999221 2078 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:52:06.000427 kubelet[2078]: E0913 00:52:06.000409 2078 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.8-n-93bff2e88f\" not found" Sep 13 00:52:06.084464 systemd[1]: Created slice kubepods-burstable-pod4f971ca0aa06c0d04f870f18e50a1d11.slice. Sep 13 00:52:06.094803 systemd[1]: Created slice kubepods-burstable-pod056b664b6638cb3d9b0b5dc040f94308.slice. Sep 13 00:52:06.098324 systemd[1]: Created slice kubepods-burstable-pode64df3f353ec48196a34527b9634e740.slice. Sep 13 00:52:06.100278 kubelet[2078]: I0913 00:52:06.100238 2078 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.100823 kubelet[2078]: E0913 00:52:06.100793 2078 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.43:6443/api/v1/nodes\": dial tcp 10.200.4.43:6443: connect: connection refused" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.131262 kubelet[2078]: E0913 00:52:06.131228 2078 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-93bff2e88f?timeout=10s\": dial tcp 10.200.4.43:6443: connect: connection refused" interval="400ms" Sep 13 00:52:06.234383 kubelet[2078]: I0913 00:52:06.233995 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234383 kubelet[2078]: I0913 00:52:06.234052 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e64df3f353ec48196a34527b9634e740-kubeconfig\") pod \"kube-scheduler-ci-3510.3.8-n-93bff2e88f\" (UID: \"e64df3f353ec48196a34527b9634e740\") " pod="kube-system/kube-scheduler-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234383 kubelet[2078]: I0913 00:52:06.234079 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f971ca0aa06c0d04f870f18e50a1d11-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" (UID: \"4f971ca0aa06c0d04f870f18e50a1d11\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234383 kubelet[2078]: I0913 00:52:06.234118 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234383 kubelet[2078]: I0913 00:52:06.234142 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234676 kubelet[2078]: I0913 00:52:06.234164 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234676 kubelet[2078]: I0913 00:52:06.234185 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f971ca0aa06c0d04f870f18e50a1d11-ca-certs\") pod \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" (UID: \"4f971ca0aa06c0d04f870f18e50a1d11\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234676 kubelet[2078]: I0913 00:52:06.234208 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f971ca0aa06c0d04f870f18e50a1d11-k8s-certs\") pod \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" (UID: \"4f971ca0aa06c0d04f870f18e50a1d11\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.234676 kubelet[2078]: I0913 00:52:06.234234 2078 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-ca-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.302496 kubelet[2078]: I0913 00:52:06.302467 2078 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.302834 kubelet[2078]: E0913 00:52:06.302806 2078 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.43:6443/api/v1/nodes\": dial tcp 10.200.4.43:6443: connect: connection refused" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.395500 env[1437]: time="2025-09-13T00:52:06.395449778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.8-n-93bff2e88f,Uid:4f971ca0aa06c0d04f870f18e50a1d11,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:06.398462 env[1437]: time="2025-09-13T00:52:06.398429877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.8-n-93bff2e88f,Uid:056b664b6638cb3d9b0b5dc040f94308,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:06.402226 env[1437]: time="2025-09-13T00:52:06.402181475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.8-n-93bff2e88f,Uid:e64df3f353ec48196a34527b9634e740,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:06.532494 kubelet[2078]: E0913 00:52:06.532411 2078 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-93bff2e88f?timeout=10s\": dial tcp 10.200.4.43:6443: connect: connection refused" interval="800ms" Sep 13 00:52:06.704398 kubelet[2078]: I0913 00:52:06.704367 2078 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.704943 kubelet[2078]: E0913 00:52:06.704916 2078 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.43:6443/api/v1/nodes\": dial tcp 10.200.4.43:6443: connect: connection refused" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:06.835478 kubelet[2078]: W0913 00:52:06.835373 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:06.835478 kubelet[2078]: E0913 00:52:06.835431 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:06.914853 kubelet[2078]: W0913 00:52:06.914613 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:06.914971 kubelet[2078]: E0913 00:52:06.914865 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:06.977234 kubelet[2078]: W0913 00:52:06.977178 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.43:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:06.977561 kubelet[2078]: E0913 00:52:06.977237 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.43:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:07.333158 kubelet[2078]: E0913 00:52:07.333086 2078 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-93bff2e88f?timeout=10s\": dial tcp 10.200.4.43:6443: connect: connection refused" interval="1.6s" Sep 13 00:52:07.444669 kubelet[2078]: W0913 00:52:07.444614 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-93bff2e88f&limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:07.444792 kubelet[2078]: E0913 00:52:07.444677 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-93bff2e88f&limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:07.506622 kubelet[2078]: I0913 00:52:07.506591 2078 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:07.506942 kubelet[2078]: E0913 00:52:07.506912 2078 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.43:6443/api/v1/nodes\": dial tcp 10.200.4.43:6443: connect: connection refused" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:08.066998 kubelet[2078]: E0913 00:52:08.066960 2078 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.43:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:08.805969 kubelet[2078]: W0913 00:52:08.805935 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.43:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:08.806164 kubelet[2078]: E0913 00:52:08.805978 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.43:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:08.920553 kubelet[2078]: W0913 00:52:08.920520 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:08.920723 kubelet[2078]: E0913 00:52:08.920563 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:08.934287 kubelet[2078]: E0913 00:52:08.934230 2078 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-93bff2e88f?timeout=10s\": dial tcp 10.200.4.43:6443: connect: connection refused" interval="3.2s" Sep 13 00:52:09.108651 kubelet[2078]: I0913 00:52:09.108554 2078 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:09.109282 kubelet[2078]: E0913 00:52:09.109252 2078 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.43:6443/api/v1/nodes\": dial tcp 10.200.4.43:6443: connect: connection refused" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:10.163501 kubelet[2078]: W0913 00:52:09.595465 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:10.163501 kubelet[2078]: E0913 00:52:09.595505 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:10.163501 kubelet[2078]: W0913 00:52:09.961864 2078 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-93bff2e88f&limit=500&resourceVersion=0": dial tcp 10.200.4.43:6443: connect: connection refused Sep 13 00:52:10.163501 kubelet[2078]: E0913 00:52:09.961912 2078 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-93bff2e88f&limit=500&resourceVersion=0\": dial tcp 10.200.4.43:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:52:10.995392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount283560828.mount: Deactivated successfully. Sep 13 00:52:11.019134 env[1437]: time="2025-09-13T00:52:11.019073952Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.025381 env[1437]: time="2025-09-13T00:52:11.025349528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.033457 env[1437]: time="2025-09-13T00:52:11.033421783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.036680 env[1437]: time="2025-09-13T00:52:11.036647425Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.041056 env[1437]: time="2025-09-13T00:52:11.041023917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.042724 env[1437]: time="2025-09-13T00:52:11.042698891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.045017 env[1437]: time="2025-09-13T00:52:11.044989692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.049253 env[1437]: time="2025-09-13T00:52:11.049223478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.051703 env[1437]: time="2025-09-13T00:52:11.051674686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.056588 env[1437]: time="2025-09-13T00:52:11.056553100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.059339 env[1437]: time="2025-09-13T00:52:11.059314522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.069340 env[1437]: time="2025-09-13T00:52:11.069306761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:11.118819 env[1437]: time="2025-09-13T00:52:11.118747636Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:11.118819 env[1437]: time="2025-09-13T00:52:11.118784338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:11.118819 env[1437]: time="2025-09-13T00:52:11.118799938Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:11.124448 env[1437]: time="2025-09-13T00:52:11.119133453Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b6be436ff4a0e649be2e391187155c1cb19da3a6a8fca7f3fd20eb50e3de035e pid=2119 runtime=io.containerd.runc.v2 Sep 13 00:52:11.139272 env[1437]: time="2025-09-13T00:52:11.139204236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:11.139407 env[1437]: time="2025-09-13T00:52:11.139278339Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:11.139407 env[1437]: time="2025-09-13T00:52:11.139306540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:11.139537 env[1437]: time="2025-09-13T00:52:11.139505649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59ca81cbea91c1d9e9250a136a4336c4ba6b8f59f31f285df3bec92ed013c4b7 pid=2137 runtime=io.containerd.runc.v2 Sep 13 00:52:11.146319 systemd[1]: Started cri-containerd-b6be436ff4a0e649be2e391187155c1cb19da3a6a8fca7f3fd20eb50e3de035e.scope. Sep 13 00:52:11.147346 env[1437]: time="2025-09-13T00:52:11.146602161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:11.155449 env[1437]: time="2025-09-13T00:52:11.155392048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:11.155602 env[1437]: time="2025-09-13T00:52:11.155430150Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:11.155670 env[1437]: time="2025-09-13T00:52:11.155594257Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d65b4e298bc9b92dc6055b3dd0c6578112c49234a311192cc75bde9bb583f336 pid=2157 runtime=io.containerd.runc.v2 Sep 13 00:52:11.190024 kernel: kauditd_printk_skb: 251 callbacks suppressed Sep 13 00:52:11.190160 kernel: audit: type=1400 audit(1757724731.169:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.196050 systemd[1]: Started cri-containerd-59ca81cbea91c1d9e9250a136a4336c4ba6b8f59f31f285df3bec92ed013c4b7.scope. Sep 13 00:52:11.203380 systemd[1]: Started cri-containerd-d65b4e298bc9b92dc6055b3dd0c6578112c49234a311192cc75bde9bb583f336.scope. Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.219166 kernel: audit: type=1400 audit(1757724731.169:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.244491 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:52:11.244590 kernel: audit: audit_lost=19 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:52:11.244618 kernel: audit: type=1400 audit(1757724731.169:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.244642 kernel: audit: backlog limit exceeded Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.267444 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:52:11.267553 kernel: audit: type=1400 audit(1757724731.169:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.267584 kernel: audit: audit_lost=20 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.277506 kernel: audit: backlog limit exceeded Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit: BPF prog-id=62 op=LOAD Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2119 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626534333666663461306536343962653265333931313837313535 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2119 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626534333666663461306536343962653265333931313837313535 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit: BPF prog-id=63 op=LOAD Sep 13 00:52:11.189000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000215720 items=0 ppid=2119 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626534333666663461306536343962653265333931313837313535 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit: BPF prog-id=64 op=LOAD Sep 13 00:52:11.189000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000215768 items=0 ppid=2119 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626534333666663461306536343962653265333931313837313535 Sep 13 00:52:11.189000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:52:11.189000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.189000 audit: BPF prog-id=65 op=LOAD Sep 13 00:52:11.189000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000215b78 items=0 ppid=2119 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626534333666663461306536343962653265333931313837313535 Sep 13 00:52:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.277000 audit: BPF prog-id=66 op=LOAD Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2157 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356234653239386263396239326463363035356233646430633635 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2157 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356234653239386263396239326463363035356233646430633635 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit: BPF prog-id=67 op=LOAD Sep 13 00:52:11.278000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003014d0 items=0 ppid=2157 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356234653239386263396239326463363035356233646430633635 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.278000 audit: BPF prog-id=68 op=LOAD Sep 13 00:52:11.278000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000301518 items=0 ppid=2157 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356234653239386263396239326463363035356233646430633635 Sep 13 00:52:11.278000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:52:11.279000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.279000 audit: BPF prog-id=69 op=LOAD Sep 13 00:52:11.279000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000301928 items=0 ppid=2157 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356234653239386263396239326463363035356233646430633635 Sep 13 00:52:11.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.281000 audit: BPF prog-id=70 op=LOAD Sep 13 00:52:11.284000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.284000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2137 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539636138316362656139316331643965393235306131333661343333 Sep 13 00:52:11.284000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.284000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2137 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539636138316362656139316331643965393235306131333661343333 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.285000 audit: BPF prog-id=71 op=LOAD Sep 13 00:52:11.285000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000308d50 items=0 ppid=2137 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539636138316362656139316331643965393235306131333661343333 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.286000 audit: BPF prog-id=72 op=LOAD Sep 13 00:52:11.286000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000308d98 items=0 ppid=2137 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539636138316362656139316331643965393235306131333661343333 Sep 13 00:52:11.287000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:52:11.287000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.288000 audit: BPF prog-id=73 op=LOAD Sep 13 00:52:11.288000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003091a8 items=0 ppid=2137 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539636138316362656139316331643965393235306131333661343333 Sep 13 00:52:11.303392 env[1437]: time="2025-09-13T00:52:11.303347856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.8-n-93bff2e88f,Uid:4f971ca0aa06c0d04f870f18e50a1d11,Namespace:kube-system,Attempt:0,} returns sandbox id \"b6be436ff4a0e649be2e391187155c1cb19da3a6a8fca7f3fd20eb50e3de035e\"" Sep 13 00:52:11.308654 env[1437]: time="2025-09-13T00:52:11.308620688Z" level=info msg="CreateContainer within sandbox \"b6be436ff4a0e649be2e391187155c1cb19da3a6a8fca7f3fd20eb50e3de035e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 13 00:52:11.322779 env[1437]: time="2025-09-13T00:52:11.322730509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.8-n-93bff2e88f,Uid:e64df3f353ec48196a34527b9634e740,Namespace:kube-system,Attempt:0,} returns sandbox id \"d65b4e298bc9b92dc6055b3dd0c6578112c49234a311192cc75bde9bb583f336\"" Sep 13 00:52:11.328325 env[1437]: time="2025-09-13T00:52:11.328290953Z" level=info msg="CreateContainer within sandbox \"d65b4e298bc9b92dc6055b3dd0c6578112c49234a311192cc75bde9bb583f336\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 13 00:52:11.344353 env[1437]: time="2025-09-13T00:52:11.344312258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.8-n-93bff2e88f,Uid:056b664b6638cb3d9b0b5dc040f94308,Namespace:kube-system,Attempt:0,} returns sandbox id \"59ca81cbea91c1d9e9250a136a4336c4ba6b8f59f31f285df3bec92ed013c4b7\"" Sep 13 00:52:11.346183 env[1437]: time="2025-09-13T00:52:11.346151439Z" level=info msg="CreateContainer within sandbox \"59ca81cbea91c1d9e9250a136a4336c4ba6b8f59f31f285df3bec92ed013c4b7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 13 00:52:11.352383 env[1437]: time="2025-09-13T00:52:11.352359512Z" level=info msg="CreateContainer within sandbox \"b6be436ff4a0e649be2e391187155c1cb19da3a6a8fca7f3fd20eb50e3de035e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ee13c1dc279c8eb9d0df5365fd1f0084bfbb34189f1e44a63466640609221fbf\"" Sep 13 00:52:11.352873 env[1437]: time="2025-09-13T00:52:11.352854434Z" level=info msg="StartContainer for \"ee13c1dc279c8eb9d0df5365fd1f0084bfbb34189f1e44a63466640609221fbf\"" Sep 13 00:52:11.368469 systemd[1]: Started cri-containerd-ee13c1dc279c8eb9d0df5365fd1f0084bfbb34189f1e44a63466640609221fbf.scope. Sep 13 00:52:11.382491 env[1437]: time="2025-09-13T00:52:11.382446335Z" level=info msg="CreateContainer within sandbox \"d65b4e298bc9b92dc6055b3dd0c6578112c49234a311192cc75bde9bb583f336\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"68e6e4753f359e475f1be47445c642e2ec6951540efbd54d606c3188c98e9052\"" Sep 13 00:52:11.384707 env[1437]: time="2025-09-13T00:52:11.384675433Z" level=info msg="StartContainer for \"68e6e4753f359e475f1be47445c642e2ec6951540efbd54d606c3188c98e9052\"" Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.386000 audit: BPF prog-id=74 op=LOAD Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2119 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313363316463323739633865623964306466353336356664316630 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2119 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313363316463323739633865623964306466353336356664316630 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit: BPF prog-id=75 op=LOAD Sep 13 00:52:11.387000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d1bb0 items=0 ppid=2119 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313363316463323739633865623964306466353336356664316630 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit: BPF prog-id=76 op=LOAD Sep 13 00:52:11.387000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d1bf8 items=0 ppid=2119 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313363316463323739633865623964306466353336356664316630 Sep 13 00:52:11.387000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:52:11.387000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.387000 audit: BPF prog-id=77 op=LOAD Sep 13 00:52:11.387000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b4008 items=0 ppid=2119 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313363316463323739633865623964306466353336356664316630 Sep 13 00:52:11.413834 env[1437]: time="2025-09-13T00:52:11.413804315Z" level=info msg="CreateContainer within sandbox \"59ca81cbea91c1d9e9250a136a4336c4ba6b8f59f31f285df3bec92ed013c4b7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"8ec7fcc4162290b61740afe4964a1078c0b364fc1efb92a3b05b94a698776389\"" Sep 13 00:52:11.414254 env[1437]: time="2025-09-13T00:52:11.414225533Z" level=info msg="StartContainer for \"8ec7fcc4162290b61740afe4964a1078c0b364fc1efb92a3b05b94a698776389\"" Sep 13 00:52:11.417905 systemd[1]: Started cri-containerd-68e6e4753f359e475f1be47445c642e2ec6951540efbd54d606c3188c98e9052.scope. Sep 13 00:52:11.434369 systemd[1]: Started cri-containerd-8ec7fcc4162290b61740afe4964a1078c0b364fc1efb92a3b05b94a698776389.scope. Sep 13 00:52:11.451549 env[1437]: time="2025-09-13T00:52:11.451499173Z" level=info msg="StartContainer for \"ee13c1dc279c8eb9d0df5365fd1f0084bfbb34189f1e44a63466640609221fbf\" returns successfully" Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit: BPF prog-id=78 op=LOAD Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2157 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653665343735336633353965343735663162653437343435633634 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2157 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653665343735336633353965343735663162653437343435633634 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.455000 audit: BPF prog-id=79 op=LOAD Sep 13 00:52:11.455000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000989f0 items=0 ppid=2157 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653665343735336633353965343735663162653437343435633634 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit: BPF prog-id=80 op=LOAD Sep 13 00:52:11.456000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098a38 items=0 ppid=2157 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653665343735336633353965343735663162653437343435633634 Sep 13 00:52:11.456000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:52:11.456000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.456000 audit: BPF prog-id=81 op=LOAD Sep 13 00:52:11.456000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098e48 items=0 ppid=2157 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653665343735336633353965343735663162653437343435633634 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit: BPF prog-id=82 op=LOAD Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2137 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633766636334313632323930623631373430616665343936346131 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2137 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633766636334313632323930623631373430616665343936346131 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit: BPF prog-id=83 op=LOAD Sep 13 00:52:11.472000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c4db0 items=0 ppid=2137 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633766636334313632323930623631373430616665343936346131 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit: BPF prog-id=84 op=LOAD Sep 13 00:52:11.472000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c4df8 items=0 ppid=2137 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633766636334313632323930623631373430616665343936346131 Sep 13 00:52:11.472000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:52:11.472000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:11.472000 audit: BPF prog-id=85 op=LOAD Sep 13 00:52:11.472000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c5208 items=0 ppid=2137 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633766636334313632323930623631373430616665343936346131 Sep 13 00:52:11.510781 env[1437]: time="2025-09-13T00:52:11.510736678Z" level=info msg="StartContainer for \"68e6e4753f359e475f1be47445c642e2ec6951540efbd54d606c3188c98e9052\" returns successfully" Sep 13 00:52:11.546595 env[1437]: time="2025-09-13T00:52:11.546501451Z" level=info msg="StartContainer for \"8ec7fcc4162290b61740afe4964a1078c0b364fc1efb92a3b05b94a698776389\" returns successfully" Sep 13 00:52:12.311332 kubelet[2078]: I0913 00:52:12.311307 2078 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:13.287000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.287000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000a8c000 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:13.287000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:13.287000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.287000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000772040 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:13.287000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:13.591000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.591000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006b92420 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:52:13.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:13.591000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.591000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006f1b640 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:52:13.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:13.591000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7411 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.591000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006b925a0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:52:13.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:13.612000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7417 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.612000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00715a510 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:52:13.612000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:13.612000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.612000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c006384040 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:52:13.612000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:13.613000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:13.613000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00715a750 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:52:13.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:13.770434 kubelet[2078]: E0913 00:52:13.770386 2078 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.8-n-93bff2e88f\" not found" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:13.850783 kubelet[2078]: I0913 00:52:13.849910 2078 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:13.850783 kubelet[2078]: E0913 00:52:13.849950 2078 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.8-n-93bff2e88f\": node \"ci-3510.3.8-n-93bff2e88f\" not found" Sep 13 00:52:13.919636 kubelet[2078]: I0913 00:52:13.919601 2078 apiserver.go:52] "Watching apiserver" Sep 13 00:52:13.932965 kubelet[2078]: I0913 00:52:13.932936 2078 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 00:52:14.124220 kubelet[2078]: E0913 00:52:14.124188 2078 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:15.802862 systemd[1]: Reloading. Sep 13 00:52:15.887581 /usr/lib/systemd/system-generators/torcx-generator[2373]: time="2025-09-13T00:52:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:52:15.887617 /usr/lib/systemd/system-generators/torcx-generator[2373]: time="2025-09-13T00:52:15Z" level=info msg="torcx already run" Sep 13 00:52:15.967896 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:52:15.967916 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:52:15.983752 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.060000 audit: BPF prog-id=86 op=LOAD Sep 13 00:52:16.060000 audit: BPF prog-id=47 op=UNLOAD Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.061000 audit: BPF prog-id=87 op=LOAD Sep 13 00:52:16.061000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:52:16.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit: BPF prog-id=88 op=LOAD Sep 13 00:52:16.063000 audit: BPF prog-id=48 op=UNLOAD Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit: BPF prog-id=89 op=LOAD Sep 13 00:52:16.064000 audit: BPF prog-id=49 op=UNLOAD Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit: BPF prog-id=90 op=LOAD Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.064000 audit: BPF prog-id=91 op=LOAD Sep 13 00:52:16.064000 audit: BPF prog-id=50 op=UNLOAD Sep 13 00:52:16.064000 audit: BPF prog-id=51 op=UNLOAD Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.065000 audit: BPF prog-id=92 op=LOAD Sep 13 00:52:16.065000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.066000 audit: BPF prog-id=93 op=LOAD Sep 13 00:52:16.066000 audit: BPF prog-id=52 op=UNLOAD Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit: BPF prog-id=94 op=LOAD Sep 13 00:52:16.069000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.070000 audit: BPF prog-id=95 op=LOAD Sep 13 00:52:16.070000 audit: BPF prog-id=53 op=UNLOAD Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit: BPF prog-id=96 op=LOAD Sep 13 00:52:16.071000 audit: BPF prog-id=54 op=UNLOAD Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit: BPF prog-id=97 op=LOAD Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.071000 audit: BPF prog-id=98 op=LOAD Sep 13 00:52:16.071000 audit: BPF prog-id=55 op=UNLOAD Sep 13 00:52:16.071000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit: BPF prog-id=99 op=LOAD Sep 13 00:52:16.073000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit: BPF prog-id=100 op=LOAD Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.073000 audit: BPF prog-id=101 op=LOAD Sep 13 00:52:16.074000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:52:16.074000 audit: BPF prog-id=59 op=UNLOAD Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit: BPF prog-id=102 op=LOAD Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit: BPF prog-id=103 op=LOAD Sep 13 00:52:16.075000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:52:16.075000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.075000 audit: BPF prog-id=104 op=LOAD Sep 13 00:52:16.075000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit: BPF prog-id=105 op=LOAD Sep 13 00:52:16.078000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.078000 audit: BPF prog-id=106 op=LOAD Sep 13 00:52:16.079000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:52:16.092956 systemd[1]: Stopping kubelet.service... Sep 13 00:52:16.114848 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:52:16.115060 systemd[1]: Stopped kubelet.service. Sep 13 00:52:16.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.117472 systemd[1]: Starting kubelet.service... Sep 13 00:52:16.241453 systemd[1]: Started kubelet.service. Sep 13 00:52:16.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.246467 kernel: kauditd_printk_skb: 605 callbacks suppressed Sep 13 00:52:16.246536 kernel: audit: type=1130 audit(1757724736.240:798): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.311306 kubelet[2440]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:16.311306 kubelet[2440]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 00:52:16.311306 kubelet[2440]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:16.311758 kubelet[2440]: I0913 00:52:16.311375 2440 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:52:16.321788 kubelet[2440]: I0913 00:52:16.321697 2440 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 00:52:16.321788 kubelet[2440]: I0913 00:52:16.321725 2440 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:52:16.325114 kubelet[2440]: I0913 00:52:16.321997 2440 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 00:52:16.325114 kubelet[2440]: I0913 00:52:16.323890 2440 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Sep 13 00:52:16.326592 kubelet[2440]: I0913 00:52:16.326571 2440 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:52:16.335855 kubelet[2440]: E0913 00:52:16.335806 2440 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:52:16.335855 kubelet[2440]: I0913 00:52:16.335853 2440 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:52:16.339174 kubelet[2440]: I0913 00:52:16.339147 2440 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:52:16.339323 kubelet[2440]: I0913 00:52:16.339254 2440 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 00:52:16.339461 kubelet[2440]: I0913 00:52:16.339428 2440 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:52:16.339635 kubelet[2440]: I0913 00:52:16.339457 2440 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.8-n-93bff2e88f","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:52:16.339753 kubelet[2440]: I0913 00:52:16.339644 2440 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:52:16.339753 kubelet[2440]: I0913 00:52:16.339657 2440 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 00:52:16.339753 kubelet[2440]: I0913 00:52:16.339688 2440 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:16.339855 kubelet[2440]: I0913 00:52:16.339797 2440 kubelet.go:408] "Attempting to sync node with API server" Sep 13 00:52:16.339855 kubelet[2440]: I0913 00:52:16.339811 2440 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:52:16.339855 kubelet[2440]: I0913 00:52:16.339841 2440 kubelet.go:314] "Adding apiserver pod source" Sep 13 00:52:16.339855 kubelet[2440]: I0913 00:52:16.339852 2440 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:52:16.340996 kubelet[2440]: I0913 00:52:16.340980 2440 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:52:16.341495 kubelet[2440]: I0913 00:52:16.341476 2440 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:52:16.341918 kubelet[2440]: I0913 00:52:16.341890 2440 server.go:1274] "Started kubelet" Sep 13 00:52:16.366280 kernel: audit: type=1400 audit(1757724736.349:799): avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.349000 audit[2440]: AVC avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.366466 kubelet[2440]: I0913 00:52:16.350859 2440 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:52:16.366466 kubelet[2440]: I0913 00:52:16.350889 2440 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 00:52:16.366466 kubelet[2440]: I0913 00:52:16.350913 2440 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:52:16.366466 kubelet[2440]: I0913 00:52:16.355723 2440 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:52:16.366466 kubelet[2440]: I0913 00:52:16.356487 2440 server.go:449] "Adding debug handlers to kubelet server" Sep 13 00:52:16.366466 kubelet[2440]: I0913 00:52:16.357273 2440 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:52:16.366711 kubelet[2440]: E0913 00:52:16.366517 2440 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:52:16.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:16.374495 kubelet[2440]: I0913 00:52:16.368944 2440 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:52:16.374495 kubelet[2440]: I0913 00:52:16.371456 2440 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 00:52:16.374495 kubelet[2440]: E0913 00:52:16.372686 2440 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-93bff2e88f\" not found" Sep 13 00:52:16.374495 kubelet[2440]: I0913 00:52:16.373789 2440 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 00:52:16.375212 kernel: audit: type=1401 audit(1757724736.349:799): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:16.349000 audit[2440]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008b52f0 a1=c0008fb7a0 a2=c0008b52c0 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.398774 kubelet[2440]: I0913 00:52:16.377392 2440 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:52:16.398774 kubelet[2440]: I0913 00:52:16.377456 2440 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:52:16.398774 kubelet[2440]: I0913 00:52:16.377509 2440 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:52:16.398774 kubelet[2440]: I0913 00:52:16.394358 2440 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:52:16.399145 kernel: audit: type=1300 audit(1757724736.349:799): arch=c000003e syscall=188 success=no exit=-22 a0=c0008b52f0 a1=c0008fb7a0 a2=c0008b52c0 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.400596 kubelet[2440]: I0913 00:52:16.400362 2440 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:52:16.400596 kubelet[2440]: I0913 00:52:16.400418 2440 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 00:52:16.400596 kubelet[2440]: I0913 00:52:16.400439 2440 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 00:52:16.400596 kubelet[2440]: E0913 00:52:16.400504 2440 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:52:16.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:16.422413 kernel: audit: type=1327 audit(1757724736.349:799): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:16.349000 audit[2440]: AVC avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.437108 kernel: audit: type=1400 audit(1757724736.349:800): avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.437815 kernel: audit: type=1401 audit(1757724736.349:800): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:16.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:16.445643 kernel: audit: type=1300 audit(1757724736.349:800): arch=c000003e syscall=188 success=no exit=-22 a0=c0005fef60 a1=c0008fb7b8 a2=c0008b5380 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.349000 audit[2440]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005fef60 a1=c0008fb7b8 a2=c0008b5380 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.459678 kubelet[2440]: I0913 00:52:16.459665 2440 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 00:52:16.459782 kubelet[2440]: I0913 00:52:16.459773 2440 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 00:52:16.459852 kubelet[2440]: I0913 00:52:16.459847 2440 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:16.460043 kubelet[2440]: I0913 00:52:16.460034 2440 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 13 00:52:16.460126 kubelet[2440]: I0913 00:52:16.460104 2440 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 13 00:52:16.460164 kubelet[2440]: I0913 00:52:16.460159 2440 policy_none.go:49] "None policy: Start" Sep 13 00:52:16.460723 kubelet[2440]: I0913 00:52:16.460713 2440 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 00:52:16.460812 kubelet[2440]: I0913 00:52:16.460806 2440 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:52:16.460999 kubelet[2440]: I0913 00:52:16.460992 2440 state_mem.go:75] "Updated machine memory state" Sep 13 00:52:16.465995 kubelet[2440]: I0913 00:52:16.465971 2440 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:52:16.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:16.471402 kubelet[2440]: I0913 00:52:16.471262 2440 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:52:16.486441 kernel: audit: type=1327 audit(1757724736.349:800): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:16.487112 kernel: audit: type=1400 audit(1757724736.466:801): avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.466000 audit[2440]: AVC avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:16.466000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:16.466000 audit[2440]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00091fd40 a1=c000fb1c08 a2=c00091fd10 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.466000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:16.501450 kubelet[2440]: E0913 00:52:16.501422 2440 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Sep 13 00:52:16.913727 kubelet[2440]: E0913 00:52:16.701919 2440 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Sep 13 00:52:16.914101 kubelet[2440]: I0913 00:52:16.914024 2440 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:52:16.914240 kubelet[2440]: I0913 00:52:16.914212 2440 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:52:16.914354 kubelet[2440]: I0913 00:52:16.914334 2440 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:52:16.914410 kubelet[2440]: I0913 00:52:16.914356 2440 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:52:16.914653 kubelet[2440]: I0913 00:52:16.914625 2440 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:52:17.025745 kubelet[2440]: I0913 00:52:17.025716 2440 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.035976 kubelet[2440]: I0913 00:52:17.035956 2440 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.036292 kubelet[2440]: I0913 00:52:17.036270 2440 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.114121 kubelet[2440]: W0913 00:52:17.113217 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:52:17.116796 kubelet[2440]: W0913 00:52:17.116510 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:52:17.117109 kubelet[2440]: W0913 00:52:17.117064 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:52:17.215913 kubelet[2440]: I0913 00:52:17.215792 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.216166 kubelet[2440]: I0913 00:52:17.216150 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.216268 kubelet[2440]: I0913 00:52:17.216253 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e64df3f353ec48196a34527b9634e740-kubeconfig\") pod \"kube-scheduler-ci-3510.3.8-n-93bff2e88f\" (UID: \"e64df3f353ec48196a34527b9634e740\") " pod="kube-system/kube-scheduler-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.216371 kubelet[2440]: I0913 00:52:17.216355 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.216576 kubelet[2440]: I0913 00:52:17.216548 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f971ca0aa06c0d04f870f18e50a1d11-ca-certs\") pod \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" (UID: \"4f971ca0aa06c0d04f870f18e50a1d11\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.216731 kubelet[2440]: I0913 00:52:17.216719 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f971ca0aa06c0d04f870f18e50a1d11-k8s-certs\") pod \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" (UID: \"4f971ca0aa06c0d04f870f18e50a1d11\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.217138 kubelet[2440]: I0913 00:52:17.217111 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f971ca0aa06c0d04f870f18e50a1d11-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.8-n-93bff2e88f\" (UID: \"4f971ca0aa06c0d04f870f18e50a1d11\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.217202 kubelet[2440]: I0913 00:52:17.217143 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-ca-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.217239 kubelet[2440]: I0913 00:52:17.217203 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/056b664b6638cb3d9b0b5dc040f94308-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.8-n-93bff2e88f\" (UID: \"056b664b6638cb3d9b0b5dc040f94308\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:17.340403 kubelet[2440]: I0913 00:52:17.340361 2440 apiserver.go:52] "Watching apiserver" Sep 13 00:52:17.375104 kubelet[2440]: I0913 00:52:17.374786 2440 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 00:52:17.460576 kubelet[2440]: I0913 00:52:17.460502 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.8-n-93bff2e88f" podStartSLOduration=0.460483689 podStartE2EDuration="460.483689ms" podCreationTimestamp="2025-09-13 00:52:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:17.446281061 +0000 UTC m=+1.184550943" watchObservedRunningTime="2025-09-13 00:52:17.460483689 +0000 UTC m=+1.198753571" Sep 13 00:52:17.500000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:17.500000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000efc820 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:17.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:17.503000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:17.503000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f017c0 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:17.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:17.503000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:17.503000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f017e0 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:17.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:17.503000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:17.503000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f01800 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:17.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:17.513960 kubelet[2440]: I0913 00:52:17.513902 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-93bff2e88f" podStartSLOduration=0.513883076 podStartE2EDuration="513.883076ms" podCreationTimestamp="2025-09-13 00:52:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:17.482656614 +0000 UTC m=+1.220926596" watchObservedRunningTime="2025-09-13 00:52:17.513883076 +0000 UTC m=+1.252153258" Sep 13 00:52:17.544244 kubelet[2440]: I0913 00:52:17.544192 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.8-n-93bff2e88f" podStartSLOduration=0.544162202 podStartE2EDuration="544.162202ms" podCreationTimestamp="2025-09-13 00:52:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:17.514449497 +0000 UTC m=+1.252719379" watchObservedRunningTime="2025-09-13 00:52:17.544162202 +0000 UTC m=+1.282432184" Sep 13 00:52:18.747000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7442 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:52:18.747000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b37f80 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:52:18.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:20.748161 kubelet[2440]: I0913 00:52:20.748131 2440 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 13 00:52:20.749017 env[1437]: time="2025-09-13T00:52:20.748966742Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:52:20.749524 kubelet[2440]: I0913 00:52:20.749500 2440 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 13 00:52:21.432164 systemd[1]: Created slice kubepods-besteffort-pod46e088c1_174d_46c8_b263_69b0031a0127.slice. Sep 13 00:52:21.543793 kubelet[2440]: I0913 00:52:21.543746 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/46e088c1-174d-46c8-b263-69b0031a0127-kube-proxy\") pod \"kube-proxy-wf2xr\" (UID: \"46e088c1-174d-46c8-b263-69b0031a0127\") " pod="kube-system/kube-proxy-wf2xr" Sep 13 00:52:21.544042 kubelet[2440]: I0913 00:52:21.544021 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/46e088c1-174d-46c8-b263-69b0031a0127-lib-modules\") pod \"kube-proxy-wf2xr\" (UID: \"46e088c1-174d-46c8-b263-69b0031a0127\") " pod="kube-system/kube-proxy-wf2xr" Sep 13 00:52:21.544249 kubelet[2440]: I0913 00:52:21.544216 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9psnh\" (UniqueName: \"kubernetes.io/projected/46e088c1-174d-46c8-b263-69b0031a0127-kube-api-access-9psnh\") pod \"kube-proxy-wf2xr\" (UID: \"46e088c1-174d-46c8-b263-69b0031a0127\") " pod="kube-system/kube-proxy-wf2xr" Sep 13 00:52:21.544371 kubelet[2440]: I0913 00:52:21.544358 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/46e088c1-174d-46c8-b263-69b0031a0127-xtables-lock\") pod \"kube-proxy-wf2xr\" (UID: \"46e088c1-174d-46c8-b263-69b0031a0127\") " pod="kube-system/kube-proxy-wf2xr" Sep 13 00:52:21.653422 kubelet[2440]: I0913 00:52:21.653389 2440 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:52:21.741932 env[1437]: time="2025-09-13T00:52:21.741820986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wf2xr,Uid:46e088c1-174d-46c8-b263-69b0031a0127,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:21.775123 env[1437]: time="2025-09-13T00:52:21.775045594Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:21.775506 env[1437]: time="2025-09-13T00:52:21.775083795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:21.775506 env[1437]: time="2025-09-13T00:52:21.775115796Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:21.775506 env[1437]: time="2025-09-13T00:52:21.775300303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7741210bda1001274feda85629e878004876b3f89bc2bf4865d4c8b1dc0aaf50 pid=2493 runtime=io.containerd.runc.v2 Sep 13 00:52:21.800246 systemd[1]: Started cri-containerd-7741210bda1001274feda85629e878004876b3f89bc2bf4865d4c8b1dc0aaf50.scope. Sep 13 00:52:21.832997 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 13 00:52:21.833151 kernel: audit: type=1400 audit(1757724741.811:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.850111 kernel: audit: type=1400 audit(1757724741.811:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.866493 env[1437]: time="2025-09-13T00:52:21.859698517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wf2xr,Uid:46e088c1-174d-46c8-b263-69b0031a0127,Namespace:kube-system,Attempt:0,} returns sandbox id \"7741210bda1001274feda85629e878004876b3f89bc2bf4865d4c8b1dc0aaf50\"" Sep 13 00:52:21.866493 env[1437]: time="2025-09-13T00:52:21.861968693Z" level=info msg="CreateContainer within sandbox \"7741210bda1001274feda85629e878004876b3f89bc2bf4865d4c8b1dc0aaf50\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:52:21.872128 kernel: audit: type=1400 audit(1757724741.811:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.907164 kernel: audit: type=1400 audit(1757724741.811:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.922147 kernel: audit: type=1400 audit(1757724741.811:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.938137 kernel: audit: type=1400 audit(1757724741.811:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.938230 kernel: audit: type=1400 audit(1757724741.811:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.969116 kernel: audit: type=1400 audit(1757724741.811:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.987809 systemd[1]: Created slice kubepods-besteffort-podb58fdbdd_d955_40a9_81eb_c707352f8908.slice. Sep 13 00:52:21.997595 kernel: audit: type=1400 audit(1757724741.811:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.997702 kernel: audit: type=1400 audit(1757724741.816:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.816000 audit: BPF prog-id=107 op=LOAD Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343132313062646131303031323734666564613835363239653837 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343132313062646131303031323734666564613835363239653837 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.817000 audit: BPF prog-id=108 op=LOAD Sep 13 00:52:21.817000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0670 items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343132313062646131303031323734666564613835363239653837 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit: BPF prog-id=109 op=LOAD Sep 13 00:52:21.830000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a06b8 items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343132313062646131303031323734666564613835363239653837 Sep 13 00:52:21.830000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:52:21.830000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:21.830000 audit: BPF prog-id=110 op=LOAD Sep 13 00:52:21.830000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0ac8 items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343132313062646131303031323734666564613835363239653837 Sep 13 00:52:22.009385 env[1437]: time="2025-09-13T00:52:22.009299999Z" level=info msg="CreateContainer within sandbox \"7741210bda1001274feda85629e878004876b3f89bc2bf4865d4c8b1dc0aaf50\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fcfb830ab4a27ee407c00598ff29a60383f41bcbc323a6d42c4ca562d09089c9\"" Sep 13 00:52:22.011772 env[1437]: time="2025-09-13T00:52:22.010392735Z" level=info msg="StartContainer for \"fcfb830ab4a27ee407c00598ff29a60383f41bcbc323a6d42c4ca562d09089c9\"" Sep 13 00:52:22.030215 systemd[1]: Started cri-containerd-fcfb830ab4a27ee407c00598ff29a60383f41bcbc323a6d42c4ca562d09089c9.scope. Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fc1a603a2b8 items=0 ppid=2493 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663666238333061623461323765653430376330303539386666323961 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit: BPF prog-id=111 op=LOAD Sep 13 00:52:22.044000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002c3c88 items=0 ppid=2493 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663666238333061623461323765653430376330303539386666323961 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit: BPF prog-id=112 op=LOAD Sep 13 00:52:22.044000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002c3cd8 items=0 ppid=2493 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663666238333061623461323765653430376330303539386666323961 Sep 13 00:52:22.044000 audit: BPF prog-id=112 op=UNLOAD Sep 13 00:52:22.044000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.044000 audit: BPF prog-id=113 op=LOAD Sep 13 00:52:22.044000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002c3d68 items=0 ppid=2493 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663666238333061623461323765653430376330303539386666323961 Sep 13 00:52:22.053954 kubelet[2440]: I0913 00:52:22.053874 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t5v8p\" (UniqueName: \"kubernetes.io/projected/b58fdbdd-d955-40a9-81eb-c707352f8908-kube-api-access-t5v8p\") pod \"tigera-operator-58fc44c59b-xkbp6\" (UID: \"b58fdbdd-d955-40a9-81eb-c707352f8908\") " pod="tigera-operator/tigera-operator-58fc44c59b-xkbp6" Sep 13 00:52:22.053954 kubelet[2440]: I0913 00:52:22.053909 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b58fdbdd-d955-40a9-81eb-c707352f8908-var-lib-calico\") pod \"tigera-operator-58fc44c59b-xkbp6\" (UID: \"b58fdbdd-d955-40a9-81eb-c707352f8908\") " pod="tigera-operator/tigera-operator-58fc44c59b-xkbp6" Sep 13 00:52:22.062428 env[1437]: time="2025-09-13T00:52:22.062389923Z" level=info msg="StartContainer for \"fcfb830ab4a27ee407c00598ff29a60383f41bcbc323a6d42c4ca562d09089c9\" returns successfully" Sep 13 00:52:22.190000 audit[2596]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.190000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8dc92390 a2=0 a3=7fff8dc9237c items=0 ppid=2544 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:22.190000 audit[2595]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2595 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.190000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb8499a00 a2=0 a3=7ffeb84999ec items=0 ppid=2544 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:22.197000 audit[2598]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2598 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.197000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf62cc8a0 a2=0 a3=7ffdf62cc88c items=0 ppid=2544 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:22.198000 audit[2599]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.198000 audit[2599]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf3f75d30 a2=0 a3=7ffcf3f75d1c items=0 ppid=2544 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:22.202000 audit[2601]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.202000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe68aee7a0 a2=0 a3=7ffe68aee78c items=0 ppid=2544 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:52:22.204000 audit[2600]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2600 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.204000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc54b65f70 a2=0 a3=7ffc54b65f5c items=0 ppid=2544 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:52:22.291394 env[1437]: time="2025-09-13T00:52:22.291277153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-58fc44c59b-xkbp6,Uid:b58fdbdd-d955-40a9-81eb-c707352f8908,Namespace:tigera-operator,Attempt:0,}" Sep 13 00:52:22.294000 audit[2603]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.294000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc7e86a840 a2=0 a3=7ffc7e86a82c items=0 ppid=2544 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:52:22.299000 audit[2605]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2605 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.299000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe3ffea170 a2=0 a3=7ffe3ffea15c items=0 ppid=2544 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:52:22.306000 audit[2608]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.306000 audit[2608]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe1dc29c50 a2=0 a3=7ffe1dc29c3c items=0 ppid=2544 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:52:22.306000 audit[2609]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.306000 audit[2609]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9983a050 a2=0 a3=7fff9983a03c items=0 ppid=2544 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:52:22.309000 audit[2611]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2611 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.309000 audit[2611]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1f76cbf0 a2=0 a3=7fff1f76cbdc items=0 ppid=2544 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:52:22.310000 audit[2612]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.310000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffded7c1bb0 a2=0 a3=7ffded7c1b9c items=0 ppid=2544 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:52:22.313000 audit[2614]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.313000 audit[2614]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc14c98990 a2=0 a3=7ffc14c9897c items=0 ppid=2544 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:52:22.317000 audit[2617]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.317000 audit[2617]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffffaa0e3e0 a2=0 a3=7ffffaa0e3cc items=0 ppid=2544 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:52:22.318000 audit[2618]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.318000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0205bd30 a2=0 a3=7ffd0205bd1c items=0 ppid=2544 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:52:22.329000 audit[2638]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.329000 audit[2638]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff811ce240 a2=0 a3=7fff811ce22c items=0 ppid=2544 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:52:22.331015 env[1437]: time="2025-09-13T00:52:22.328944975Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:22.331015 env[1437]: time="2025-09-13T00:52:22.328986577Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:22.331015 env[1437]: time="2025-09-13T00:52:22.329001277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:22.331015 env[1437]: time="2025-09-13T00:52:22.329140382Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e458f65371ef1a40e5fce823734710ed74b037bd40e1d87cd615761a10466dae pid=2628 runtime=io.containerd.runc.v2 Sep 13 00:52:22.332000 audit[2639]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.332000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5d6b88f0 a2=0 a3=7ffe5d6b88dc items=0 ppid=2544 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:52:22.336000 audit[2646]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.336000 audit[2646]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed0407f40 a2=0 a3=7ffed0407f2c items=0 ppid=2544 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:22.347000 audit[2654]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.347000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd71e05190 a2=0 a3=7ffd71e0517c items=0 ppid=2544 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:22.345533 systemd[1]: Started cri-containerd-e458f65371ef1a40e5fce823734710ed74b037bd40e1d87cd615761a10466dae.scope. Sep 13 00:52:22.358000 audit[2664]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.358000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1726b2e0 a2=0 a3=7ffd1726b2cc items=0 ppid=2544 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[2665]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.361000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff308f2580 a2=0 a3=7fff308f256c items=0 ppid=2544 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit: BPF prog-id=114 op=LOAD Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2628 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353866363533373165663161343065356663653832333733343731 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2628 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353866363533373165663161343065356663653832333733343731 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit: BPF prog-id=115 op=LOAD Sep 13 00:52:22.362000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ec7e0 items=0 ppid=2628 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353866363533373165663161343065356663653832333733343731 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.362000 audit: BPF prog-id=116 op=LOAD Sep 13 00:52:22.362000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ec828 items=0 ppid=2628 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353866363533373165663161343065356663653832333733343731 Sep 13 00:52:22.362000 audit: BPF prog-id=116 op=UNLOAD Sep 13 00:52:22.363000 audit: BPF prog-id=115 op=UNLOAD Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.363000 audit: BPF prog-id=117 op=LOAD Sep 13 00:52:22.363000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ecc38 items=0 ppid=2628 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353866363533373165663161343065356663653832333733343731 Sep 13 00:52:22.365000 audit[2667]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.365000 audit[2667]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc88a101f0 a2=0 a3=7ffc88a101dc items=0 ppid=2544 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:22.378000 audit[2670]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.378000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9161eac0 a2=0 a3=7ffc9161eaac items=0 ppid=2544 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:22.379000 audit[2671]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.379000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd8a449c0 a2=0 a3=7ffdd8a449ac items=0 ppid=2544 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:52:22.383000 audit[2673]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:22.383000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd5d706b80 a2=0 a3=7ffd5d706b6c items=0 ppid=2544 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:52:22.395215 env[1437]: time="2025-09-13T00:52:22.395164525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-58fc44c59b-xkbp6,Uid:b58fdbdd-d955-40a9-81eb-c707352f8908,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e458f65371ef1a40e5fce823734710ed74b037bd40e1d87cd615761a10466dae\"" Sep 13 00:52:22.396977 env[1437]: time="2025-09-13T00:52:22.396952383Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 13 00:52:22.464130 kubelet[2440]: I0913 00:52:22.463240 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wf2xr" podStartSLOduration=1.463221734 podStartE2EDuration="1.463221734s" podCreationTimestamp="2025-09-13 00:52:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:22.462973626 +0000 UTC m=+6.201243608" watchObservedRunningTime="2025-09-13 00:52:22.463221734 +0000 UTC m=+6.201491616" Sep 13 00:52:22.550000 audit[2685]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:22.550000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe11baf1a0 a2=0 a3=7ffe11baf18c items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:22.590000 audit[2685]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:22.590000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe11baf1a0 a2=0 a3=7ffe11baf18c items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.590000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:22.591000 audit[2690]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.591000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed905adf0 a2=0 a3=7ffed905addc items=0 ppid=2544 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:52:22.594000 audit[2692]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.594000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeee4b7800 a2=0 a3=7ffeee4b77ec items=0 ppid=2544 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:52:22.598000 audit[2695]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.598000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe153fa890 a2=0 a3=7ffe153fa87c items=0 ppid=2544 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:52:22.599000 audit[2696]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.599000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9db17d70 a2=0 a3=7fff9db17d5c items=0 ppid=2544 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:52:22.602000 audit[2698]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.602000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0d493820 a2=0 a3=7ffd0d49380c items=0 ppid=2544 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:52:22.603000 audit[2699]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.603000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebc41fec0 a2=0 a3=7ffebc41feac items=0 ppid=2544 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:52:22.607000 audit[2701]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.607000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd048723f0 a2=0 a3=7ffd048723dc items=0 ppid=2544 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:52:22.610000 audit[2704]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.610000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd0397bb80 a2=0 a3=7ffd0397bb6c items=0 ppid=2544 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:52:22.612000 audit[2705]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.612000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4133ffa0 a2=0 a3=7ffc4133ff8c items=0 ppid=2544 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:52:22.614000 audit[2707]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.614000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6711bc70 a2=0 a3=7ffc6711bc5c items=0 ppid=2544 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:52:22.615000 audit[2708]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.615000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4fbaa570 a2=0 a3=7fff4fbaa55c items=0 ppid=2544 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:52:22.618000 audit[2710]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.618000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9d593050 a2=0 a3=7ffe9d59303c items=0 ppid=2544 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:22.622000 audit[2713]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.622000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4ddd9370 a2=0 a3=7fff4ddd935c items=0 ppid=2544 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:52:22.625000 audit[2716]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.625000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedd47dc70 a2=0 a3=7ffedd47dc5c items=0 ppid=2544 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:52:22.626000 audit[2717]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.626000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffcd776670 a2=0 a3=7fffcd77665c items=0 ppid=2544 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:52:22.629000 audit[2719]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.629000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc2a65bce0 a2=0 a3=7ffc2a65bccc items=0 ppid=2544 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:22.632000 audit[2722]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.632000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc15972510 a2=0 a3=7ffc159724fc items=0 ppid=2544 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:22.633000 audit[2723]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.633000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc1d34880 a2=0 a3=7fffc1d3486c items=0 ppid=2544 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:52:22.636000 audit[2725]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.636000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8c436e80 a2=0 a3=7ffe8c436e6c items=0 ppid=2544 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:52:22.637000 audit[2726]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.637000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc81237cf0 a2=0 a3=7ffc81237cdc items=0 ppid=2544 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:52:22.639000 audit[2728]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.639000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff11b2a150 a2=0 a3=7fff11b2a13c items=0 ppid=2544 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:22.643000 audit[2731]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:22.643000 audit[2731]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff05d75c10 a2=0 a3=7fff05d75bfc items=0 ppid=2544 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:22.646000 audit[2733]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:52:22.646000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff4610b710 a2=0 a3=7fff4610b6fc items=0 ppid=2544 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.646000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:22.646000 audit[2733]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:52:22.646000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff4610b710 a2=0 a3=7fff4610b6fc items=0 ppid=2544 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:22.646000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:22.663259 systemd[1]: run-containerd-runc-k8s.io-7741210bda1001274feda85629e878004876b3f89bc2bf4865d4c8b1dc0aaf50-runc.iYR5XP.mount: Deactivated successfully. Sep 13 00:52:23.804352 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2588006460.mount: Deactivated successfully. Sep 13 00:52:24.770199 env[1437]: time="2025-09-13T00:52:24.770157454Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:24.775025 env[1437]: time="2025-09-13T00:52:24.774992803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:24.777898 env[1437]: time="2025-09-13T00:52:24.777869091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:24.780658 env[1437]: time="2025-09-13T00:52:24.780624576Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:24.781115 env[1437]: time="2025-09-13T00:52:24.781067890Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 13 00:52:24.783102 env[1437]: time="2025-09-13T00:52:24.783058751Z" level=info msg="CreateContainer within sandbox \"e458f65371ef1a40e5fce823734710ed74b037bd40e1d87cd615761a10466dae\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 13 00:52:24.813916 env[1437]: time="2025-09-13T00:52:24.813871099Z" level=info msg="CreateContainer within sandbox \"e458f65371ef1a40e5fce823734710ed74b037bd40e1d87cd615761a10466dae\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a8d77ee249d4ee5b9cbaa8ba9f3febd285a26947770cae216b9c5ec489e0ae7e\"" Sep 13 00:52:24.815610 env[1437]: time="2025-09-13T00:52:24.814624622Z" level=info msg="StartContainer for \"a8d77ee249d4ee5b9cbaa8ba9f3febd285a26947770cae216b9c5ec489e0ae7e\"" Sep 13 00:52:24.847124 systemd[1]: Started cri-containerd-a8d77ee249d4ee5b9cbaa8ba9f3febd285a26947770cae216b9c5ec489e0ae7e.scope. Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.857000 audit: BPF prog-id=118 op=LOAD Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2628 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:24.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643737656532343964346565356239636261613862613966336665 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2628 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:24.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643737656532343964346565356239636261613862613966336665 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit: BPF prog-id=119 op=LOAD Sep 13 00:52:24.858000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002aa1e0 items=0 ppid=2628 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:24.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643737656532343964346565356239636261613862613966336665 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit: BPF prog-id=120 op=LOAD Sep 13 00:52:24.858000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002aa228 items=0 ppid=2628 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:24.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643737656532343964346565356239636261613862613966336665 Sep 13 00:52:24.858000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:52:24.858000 audit: BPF prog-id=119 op=UNLOAD Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:24.858000 audit: BPF prog-id=121 op=LOAD Sep 13 00:52:24.858000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002aa638 items=0 ppid=2628 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:24.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643737656532343964346565356239636261613862613966336665 Sep 13 00:52:24.878222 env[1437]: time="2025-09-13T00:52:24.878187178Z" level=info msg="StartContainer for \"a8d77ee249d4ee5b9cbaa8ba9f3febd285a26947770cae216b9c5ec489e0ae7e\" returns successfully" Sep 13 00:52:25.509634 kubelet[2440]: I0913 00:52:25.509586 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-58fc44c59b-xkbp6" podStartSLOduration=2.123973837 podStartE2EDuration="4.50956959s" podCreationTimestamp="2025-09-13 00:52:21 +0000 UTC" firstStartedPulling="2025-09-13 00:52:22.396401465 +0000 UTC m=+6.134671347" lastFinishedPulling="2025-09-13 00:52:24.781997218 +0000 UTC m=+8.520267100" observedRunningTime="2025-09-13 00:52:25.469208581 +0000 UTC m=+9.207478563" watchObservedRunningTime="2025-09-13 00:52:25.50956959 +0000 UTC m=+9.247839472" Sep 13 00:52:31.137656 sudo[1750]: pam_unix(sudo:session): session closed for user root Sep 13 00:52:31.136000 audit[1750]: USER_END pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:31.143051 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 13 00:52:31.143158 kernel: audit: type=1106 audit(1757724751.136:918): pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:31.157000 audit[1750]: CRED_DISP pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:31.182145 kernel: audit: type=1104 audit(1757724751.157:919): pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:31.254480 sshd[1747]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:31.254000 audit[1747]: USER_END pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:31.278062 systemd[1]: sshd@6-10.200.4.43:22-10.200.16.10:32794.service: Deactivated successfully. Sep 13 00:52:31.279270 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:52:31.279430 systemd[1]: session-9.scope: Consumed 4.309s CPU time. Sep 13 00:52:31.280693 kernel: audit: type=1106 audit(1757724751.254:920): pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:31.280271 systemd-logind[1426]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:52:31.281519 systemd-logind[1426]: Removed session 9. Sep 13 00:52:31.254000 audit[1747]: CRED_DISP pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:31.303117 kernel: audit: type=1104 audit(1757724751.254:921): pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:31.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.43:22-10.200.16.10:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:31.326123 kernel: audit: type=1131 audit(1757724751.276:922): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.43:22-10.200.16.10:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:31.938000 audit[2817]: NETFILTER_CFG table=filter:92 family=2 entries=14 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:31.954116 kernel: audit: type=1325 audit(1757724751.938:923): table=filter:92 family=2 entries=14 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:31.938000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd4431d060 a2=0 a3=7ffd4431d04c items=0 ppid=2544 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:31.987108 kernel: audit: type=1300 audit(1757724751.938:923): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd4431d060 a2=0 a3=7ffd4431d04c items=0 ppid=2544 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:31.938000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:32.003110 kernel: audit: type=1327 audit(1757724751.938:923): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:31.960000 audit[2817]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:31.960000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4431d060 a2=0 a3=0 items=0 ppid=2544 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.039444 kernel: audit: type=1325 audit(1757724751.960:924): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:32.039559 kernel: audit: type=1300 audit(1757724751.960:924): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4431d060 a2=0 a3=0 items=0 ppid=2544 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:31.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:32.069000 audit[2819]: NETFILTER_CFG table=filter:94 family=2 entries=15 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:32.069000 audit[2819]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff9d2075e0 a2=0 a3=7fff9d2075cc items=0 ppid=2544 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:32.073000 audit[2819]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:32.073000 audit[2819]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff9d2075e0 a2=0 a3=0 items=0 ppid=2544 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:35.191000 audit[2822]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:35.191000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc45b49180 a2=0 a3=7ffc45b4916c items=0 ppid=2544 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:35.198000 audit[2822]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:35.198000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc45b49180 a2=0 a3=0 items=0 ppid=2544 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:35.206000 audit[2824]: NETFILTER_CFG table=filter:98 family=2 entries=18 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:35.206000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd83298b80 a2=0 a3=7ffd83298b6c items=0 ppid=2544 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:35.209000 audit[2824]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:35.209000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd83298b80 a2=0 a3=0 items=0 ppid=2544 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:35.475230 systemd[1]: Created slice kubepods-besteffort-pod443f8265_9407_4c9c_b947_7c78810bfd95.slice. Sep 13 00:52:35.562735 kubelet[2440]: I0913 00:52:35.562694 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/443f8265-9407-4c9c-b947-7c78810bfd95-typha-certs\") pod \"calico-typha-5fd8674bc7-k9wqr\" (UID: \"443f8265-9407-4c9c-b947-7c78810bfd95\") " pod="calico-system/calico-typha-5fd8674bc7-k9wqr" Sep 13 00:52:35.563139 kubelet[2440]: I0913 00:52:35.562757 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-chmgb\" (UniqueName: \"kubernetes.io/projected/443f8265-9407-4c9c-b947-7c78810bfd95-kube-api-access-chmgb\") pod \"calico-typha-5fd8674bc7-k9wqr\" (UID: \"443f8265-9407-4c9c-b947-7c78810bfd95\") " pod="calico-system/calico-typha-5fd8674bc7-k9wqr" Sep 13 00:52:35.563139 kubelet[2440]: I0913 00:52:35.562787 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/443f8265-9407-4c9c-b947-7c78810bfd95-tigera-ca-bundle\") pod \"calico-typha-5fd8674bc7-k9wqr\" (UID: \"443f8265-9407-4c9c-b947-7c78810bfd95\") " pod="calico-system/calico-typha-5fd8674bc7-k9wqr" Sep 13 00:52:35.794174 env[1437]: time="2025-09-13T00:52:35.794043498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5fd8674bc7-k9wqr,Uid:443f8265-9407-4c9c-b947-7c78810bfd95,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:35.821600 env[1437]: time="2025-09-13T00:52:35.821540834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:35.821745 env[1437]: time="2025-09-13T00:52:35.821576235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:35.821745 env[1437]: time="2025-09-13T00:52:35.821591735Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:35.821745 env[1437]: time="2025-09-13T00:52:35.821715138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/205aee856a6cf8752719b9b0b6938365d790873bb28efc63d6b5bf5fa6e80f6e pid=2834 runtime=io.containerd.runc.v2 Sep 13 00:52:35.843011 systemd[1]: Started cri-containerd-205aee856a6cf8752719b9b0b6938365d790873bb28efc63d6b5bf5fa6e80f6e.scope. Sep 13 00:52:35.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.873000 audit: BPF prog-id=122 op=LOAD Sep 13 00:52:35.875000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.875000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2834 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356165653835366136636638373532373139623962306236393338 Sep 13 00:52:35.875000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.875000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2834 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356165653835366136636638373532373139623962306236393338 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit: BPF prog-id=123 op=LOAD Sep 13 00:52:35.876000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a9cc0 items=0 ppid=2834 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356165653835366136636638373532373139623962306236393338 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit: BPF prog-id=124 op=LOAD Sep 13 00:52:35.876000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a9d08 items=0 ppid=2834 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356165653835366136636638373532373139623962306236393338 Sep 13 00:52:35.876000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:52:35.876000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:35.876000 audit: BPF prog-id=125 op=LOAD Sep 13 00:52:35.876000 audit[2843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000390118 items=0 ppid=2834 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:35.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356165653835366136636638373532373139623962306236393338 Sep 13 00:52:35.889869 systemd[1]: Created slice kubepods-besteffort-pod8e327c17_d03b_42c1_a4c0_cdb4d616112f.slice. Sep 13 00:52:35.937742 env[1437]: time="2025-09-13T00:52:35.937697822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5fd8674bc7-k9wqr,Uid:443f8265-9407-4c9c-b947-7c78810bfd95,Namespace:calico-system,Attempt:0,} returns sandbox id \"205aee856a6cf8752719b9b0b6938365d790873bb28efc63d6b5bf5fa6e80f6e\"" Sep 13 00:52:35.939032 env[1437]: time="2025-09-13T00:52:35.939000152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 13 00:52:35.965754 kubelet[2440]: I0913 00:52:35.965462 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-flexvol-driver-host\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965754 kubelet[2440]: I0913 00:52:35.965501 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8e327c17-d03b-42c1-a4c0-cdb4d616112f-node-certs\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965754 kubelet[2440]: I0913 00:52:35.965519 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8e327c17-d03b-42c1-a4c0-cdb4d616112f-tigera-ca-bundle\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965754 kubelet[2440]: I0913 00:52:35.965534 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-lib-modules\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965754 kubelet[2440]: I0913 00:52:35.965549 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-policysync\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965976 kubelet[2440]: I0913 00:52:35.965561 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-cni-log-dir\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965976 kubelet[2440]: I0913 00:52:35.965575 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-var-run-calico\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965976 kubelet[2440]: I0913 00:52:35.965591 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxth6\" (UniqueName: \"kubernetes.io/projected/8e327c17-d03b-42c1-a4c0-cdb4d616112f-kube-api-access-kxth6\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965976 kubelet[2440]: I0913 00:52:35.965605 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-cni-net-dir\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.965976 kubelet[2440]: I0913 00:52:35.965618 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-xtables-lock\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.966085 kubelet[2440]: I0913 00:52:35.965633 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-cni-bin-dir\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:35.966085 kubelet[2440]: I0913 00:52:35.965674 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8e327c17-d03b-42c1-a4c0-cdb4d616112f-var-lib-calico\") pod \"calico-node-7wcm7\" (UID: \"8e327c17-d03b-42c1-a4c0-cdb4d616112f\") " pod="calico-system/calico-node-7wcm7" Sep 13 00:52:36.071748 kubelet[2440]: E0913 00:52:36.071181 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.071748 kubelet[2440]: W0913 00:52:36.071211 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.071748 kubelet[2440]: E0913 00:52:36.071233 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.090651 kubelet[2440]: E0913 00:52:36.090619 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.090651 kubelet[2440]: W0913 00:52:36.090646 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.090857 kubelet[2440]: E0913 00:52:36.090667 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.100556 kubelet[2440]: E0913 00:52:36.100515 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:36.119694 kubelet[2440]: E0913 00:52:36.119675 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.119847 kubelet[2440]: W0913 00:52:36.119834 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.119922 kubelet[2440]: E0913 00:52:36.119910 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.120230 kubelet[2440]: E0913 00:52:36.120218 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.120324 kubelet[2440]: W0913 00:52:36.120314 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.120388 kubelet[2440]: E0913 00:52:36.120377 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.120629 kubelet[2440]: E0913 00:52:36.120620 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.120705 kubelet[2440]: W0913 00:52:36.120695 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.120765 kubelet[2440]: E0913 00:52:36.120755 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.121721 kubelet[2440]: E0913 00:52:36.121708 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.121823 kubelet[2440]: W0913 00:52:36.121810 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.121893 kubelet[2440]: E0913 00:52:36.121883 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.122189 kubelet[2440]: E0913 00:52:36.122178 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.122269 kubelet[2440]: W0913 00:52:36.122258 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.122346 kubelet[2440]: E0913 00:52:36.122335 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.122593 kubelet[2440]: E0913 00:52:36.122581 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.123380 kubelet[2440]: W0913 00:52:36.123362 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.123483 kubelet[2440]: E0913 00:52:36.123470 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.123730 kubelet[2440]: E0913 00:52:36.123719 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.123837 kubelet[2440]: W0913 00:52:36.123826 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.123916 kubelet[2440]: E0913 00:52:36.123905 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.124264 kubelet[2440]: E0913 00:52:36.124253 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.124353 kubelet[2440]: W0913 00:52:36.124342 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.124419 kubelet[2440]: E0913 00:52:36.124408 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.124651 kubelet[2440]: E0913 00:52:36.124641 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.124720 kubelet[2440]: W0913 00:52:36.124711 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.124782 kubelet[2440]: E0913 00:52:36.124772 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.124989 kubelet[2440]: E0913 00:52:36.124981 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.125056 kubelet[2440]: W0913 00:52:36.125047 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.125124 kubelet[2440]: E0913 00:52:36.125114 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.125340 kubelet[2440]: E0913 00:52:36.125331 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.125411 kubelet[2440]: W0913 00:52:36.125402 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.125466 kubelet[2440]: E0913 00:52:36.125457 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.125666 kubelet[2440]: E0913 00:52:36.125659 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.125737 kubelet[2440]: W0913 00:52:36.125728 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.125798 kubelet[2440]: E0913 00:52:36.125788 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.126004 kubelet[2440]: E0913 00:52:36.125996 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.126077 kubelet[2440]: W0913 00:52:36.126068 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.126161 kubelet[2440]: E0913 00:52:36.126150 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.126369 kubelet[2440]: E0913 00:52:36.126361 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.126440 kubelet[2440]: W0913 00:52:36.126431 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.126498 kubelet[2440]: E0913 00:52:36.126489 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.126699 kubelet[2440]: E0913 00:52:36.126691 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.126766 kubelet[2440]: W0913 00:52:36.126758 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.126827 kubelet[2440]: E0913 00:52:36.126817 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.127032 kubelet[2440]: E0913 00:52:36.127024 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.127115 kubelet[2440]: W0913 00:52:36.127106 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.127183 kubelet[2440]: E0913 00:52:36.127173 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.127410 kubelet[2440]: E0913 00:52:36.127399 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.127474 kubelet[2440]: W0913 00:52:36.127465 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.127531 kubelet[2440]: E0913 00:52:36.127522 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.127728 kubelet[2440]: E0913 00:52:36.127721 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.127784 kubelet[2440]: W0913 00:52:36.127777 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.127910 kubelet[2440]: E0913 00:52:36.127879 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.128143 kubelet[2440]: E0913 00:52:36.128134 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.128205 kubelet[2440]: W0913 00:52:36.128197 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.128267 kubelet[2440]: E0913 00:52:36.128258 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.128475 kubelet[2440]: E0913 00:52:36.128468 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.128539 kubelet[2440]: W0913 00:52:36.128531 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.128596 kubelet[2440]: E0913 00:52:36.128587 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.168280 kubelet[2440]: E0913 00:52:36.168256 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.168458 kubelet[2440]: W0913 00:52:36.168444 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.168533 kubelet[2440]: E0913 00:52:36.168522 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.168622 kubelet[2440]: I0913 00:52:36.168611 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4907e1ce-43d8-48b4-8598-39a3ca3ac943-socket-dir\") pod \"csi-node-driver-w7jh7\" (UID: \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\") " pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:36.168907 kubelet[2440]: E0913 00:52:36.168890 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.168975 kubelet[2440]: W0913 00:52:36.168907 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.168975 kubelet[2440]: E0913 00:52:36.168931 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.169144 kubelet[2440]: E0913 00:52:36.169132 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.169194 kubelet[2440]: W0913 00:52:36.169146 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.169194 kubelet[2440]: E0913 00:52:36.169167 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.169363 kubelet[2440]: E0913 00:52:36.169351 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.169418 kubelet[2440]: W0913 00:52:36.169364 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.169418 kubelet[2440]: E0913 00:52:36.169375 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.169418 kubelet[2440]: I0913 00:52:36.169408 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4907e1ce-43d8-48b4-8598-39a3ca3ac943-kubelet-dir\") pod \"csi-node-driver-w7jh7\" (UID: \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\") " pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:36.169594 kubelet[2440]: E0913 00:52:36.169581 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.169651 kubelet[2440]: W0913 00:52:36.169595 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.169651 kubelet[2440]: E0913 00:52:36.169609 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.169651 kubelet[2440]: I0913 00:52:36.169630 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4907e1ce-43d8-48b4-8598-39a3ca3ac943-varrun\") pod \"csi-node-driver-w7jh7\" (UID: \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\") " pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:36.169925 kubelet[2440]: E0913 00:52:36.169912 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.169984 kubelet[2440]: W0913 00:52:36.169926 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.169984 kubelet[2440]: E0913 00:52:36.169944 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.169984 kubelet[2440]: I0913 00:52:36.169965 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-djtr2\" (UniqueName: \"kubernetes.io/projected/4907e1ce-43d8-48b4-8598-39a3ca3ac943-kube-api-access-djtr2\") pod \"csi-node-driver-w7jh7\" (UID: \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\") " pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:36.170248 kubelet[2440]: E0913 00:52:36.170235 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.170306 kubelet[2440]: W0913 00:52:36.170248 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.170306 kubelet[2440]: E0913 00:52:36.170262 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.170306 kubelet[2440]: I0913 00:52:36.170293 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4907e1ce-43d8-48b4-8598-39a3ca3ac943-registration-dir\") pod \"csi-node-driver-w7jh7\" (UID: \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\") " pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:36.170541 kubelet[2440]: E0913 00:52:36.170528 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.170595 kubelet[2440]: W0913 00:52:36.170542 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.170595 kubelet[2440]: E0913 00:52:36.170556 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.170789 kubelet[2440]: E0913 00:52:36.170776 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.170836 kubelet[2440]: W0913 00:52:36.170796 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.170881 kubelet[2440]: E0913 00:52:36.170872 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.171018 kubelet[2440]: E0913 00:52:36.171006 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.171068 kubelet[2440]: W0913 00:52:36.171019 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.171145 kubelet[2440]: E0913 00:52:36.171127 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.171267 kubelet[2440]: E0913 00:52:36.171254 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.171316 kubelet[2440]: W0913 00:52:36.171268 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.171357 kubelet[2440]: E0913 00:52:36.171349 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.171481 kubelet[2440]: E0913 00:52:36.171470 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.171532 kubelet[2440]: W0913 00:52:36.171482 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.171565 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.171686 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.173145 kubelet[2440]: W0913 00:52:36.171693 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.171703 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.171888 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.173145 kubelet[2440]: W0913 00:52:36.171896 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.171904 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.172562 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.173145 kubelet[2440]: W0913 00:52:36.172573 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.173145 kubelet[2440]: E0913 00:52:36.172586 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.195242 env[1437]: time="2025-09-13T00:52:36.195187968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7wcm7,Uid:8e327c17-d03b-42c1-a4c0-cdb4d616112f,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:36.226000 audit[2911]: NETFILTER_CFG table=filter:100 family=2 entries=20 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:36.232776 kernel: kauditd_printk_skb: 76 callbacks suppressed Sep 13 00:52:36.232854 kernel: audit: type=1325 audit(1757724756.226:949): table=filter:100 family=2 entries=20 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:36.226000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffee36f5490 a2=0 a3=7ffee36f547c items=0 ppid=2544 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.268709 kernel: audit: type=1300 audit(1757724756.226:949): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffee36f5490 a2=0 a3=7ffee36f547c items=0 ppid=2544 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.268792 env[1437]: time="2025-09-13T00:52:36.247616752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:36.268792 env[1437]: time="2025-09-13T00:52:36.247687753Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:36.268792 env[1437]: time="2025-09-13T00:52:36.247710954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:36.268792 env[1437]: time="2025-09-13T00:52:36.247891358Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354 pid=2916 runtime=io.containerd.runc.v2 Sep 13 00:52:36.271358 kubelet[2440]: E0913 00:52:36.271335 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.271533 kubelet[2440]: W0913 00:52:36.271516 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.271618 kubelet[2440]: E0913 00:52:36.271605 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.271951 kubelet[2440]: E0913 00:52:36.271937 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.272052 kubelet[2440]: W0913 00:52:36.272039 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.272163 kubelet[2440]: E0913 00:52:36.272151 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.272480 kubelet[2440]: E0913 00:52:36.272469 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.272570 kubelet[2440]: W0913 00:52:36.272559 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.272643 kubelet[2440]: E0913 00:52:36.272630 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.272893 kubelet[2440]: E0913 00:52:36.272884 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.272964 kubelet[2440]: W0913 00:52:36.272954 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.273031 kubelet[2440]: E0913 00:52:36.273021 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.273310 kubelet[2440]: E0913 00:52:36.273298 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.273399 kubelet[2440]: W0913 00:52:36.273387 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.273469 kubelet[2440]: E0913 00:52:36.273458 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.273701 kubelet[2440]: E0913 00:52:36.273691 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.273776 kubelet[2440]: W0913 00:52:36.273764 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.273853 kubelet[2440]: E0913 00:52:36.273840 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.274114 kubelet[2440]: E0913 00:52:36.274084 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.275530 kubelet[2440]: W0913 00:52:36.275511 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.275640 kubelet[2440]: E0913 00:52:36.275628 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.276821 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279348 kubelet[2440]: W0913 00:52:36.276835 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.276855 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.277185 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279348 kubelet[2440]: W0913 00:52:36.277196 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.277280 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.277400 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279348 kubelet[2440]: W0913 00:52:36.277409 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.277486 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279348 kubelet[2440]: E0913 00:52:36.277625 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279726 kubelet[2440]: W0913 00:52:36.277635 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.279726 kubelet[2440]: E0913 00:52:36.277711 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279726 kubelet[2440]: E0913 00:52:36.277849 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279726 kubelet[2440]: W0913 00:52:36.277857 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.279726 kubelet[2440]: E0913 00:52:36.277935 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279726 kubelet[2440]: E0913 00:52:36.278104 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279726 kubelet[2440]: W0913 00:52:36.278113 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.279726 kubelet[2440]: E0913 00:52:36.278190 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.279726 kubelet[2440]: E0913 00:52:36.278311 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.279726 kubelet[2440]: W0913 00:52:36.278319 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.278332 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.278566 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.280037 kubelet[2440]: W0913 00:52:36.278575 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.278589 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.278787 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.280037 kubelet[2440]: W0913 00:52:36.278797 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.278810 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.279133 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.280037 kubelet[2440]: W0913 00:52:36.279143 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.280037 kubelet[2440]: E0913 00:52:36.279252 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.280426 kubelet[2440]: E0913 00:52:36.279375 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.280426 kubelet[2440]: W0913 00:52:36.279383 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.280426 kubelet[2440]: E0913 00:52:36.279454 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.281200 kubelet[2440]: E0913 00:52:36.281180 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.281200 kubelet[2440]: W0913 00:52:36.281199 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.281315 kubelet[2440]: E0913 00:52:36.281289 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.281452 kubelet[2440]: E0913 00:52:36.281437 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.281500 kubelet[2440]: W0913 00:52:36.281451 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.281500 kubelet[2440]: E0913 00:52:36.281467 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.281679 kubelet[2440]: E0913 00:52:36.281658 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.281679 kubelet[2440]: W0913 00:52:36.281672 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.281756 kubelet[2440]: E0913 00:52:36.281686 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.281945 kubelet[2440]: E0913 00:52:36.281931 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.282054 kubelet[2440]: W0913 00:52:36.281946 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.282054 kubelet[2440]: E0913 00:52:36.281961 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.282208 kubelet[2440]: E0913 00:52:36.282195 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.282268 kubelet[2440]: W0913 00:52:36.282210 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.282268 kubelet[2440]: E0913 00:52:36.282222 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.285106 kubelet[2440]: E0913 00:52:36.283815 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.285106 kubelet[2440]: W0913 00:52:36.283832 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.285106 kubelet[2440]: E0913 00:52:36.283848 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.285106 kubelet[2440]: E0913 00:52:36.284066 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.285106 kubelet[2440]: W0913 00:52:36.284075 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.285106 kubelet[2440]: E0913 00:52:36.284115 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:36.296394 systemd[1]: Started cri-containerd-e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354.scope. Sep 13 00:52:36.299101 kernel: audit: type=1327 audit(1757724756.226:949): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:36.282000 audit[2911]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:36.309020 kubelet[2440]: E0913 00:52:36.305815 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:36.309020 kubelet[2440]: W0913 00:52:36.305826 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:36.309020 kubelet[2440]: E0913 00:52:36.305842 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:36.316112 kernel: audit: type=1325 audit(1757724756.282:950): table=nat:101 family=2 entries=12 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:36.282000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee36f5490 a2=0 a3=0 items=0 ppid=2544 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.339108 kernel: audit: type=1300 audit(1757724756.282:950): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee36f5490 a2=0 a3=0 items=0 ppid=2544 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:36.356264 kernel: audit: type=1327 audit(1757724756.282:950): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.384140 kernel: audit: type=1400 audit(1757724756.368:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.399151 kernel: audit: type=1400 audit(1757724756.368:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.414162 kernel: audit: type=1400 audit(1757724756.368:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.433102 kernel: audit: type=1400 audit(1757724756.368:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit: BPF prog-id=126 op=LOAD Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2916 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323637333531663836666562666136633830303035393065333030 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2916 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323637333531663836666562666136633830303035393065333030 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.383000 audit: BPF prog-id=127 op=LOAD Sep 13 00:52:36.383000 audit[2925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000325790 items=0 ppid=2916 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323637333531663836666562666136633830303035393065333030 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit: BPF prog-id=128 op=LOAD Sep 13 00:52:36.413000 audit[2925]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003257d8 items=0 ppid=2916 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323637333531663836666562666136633830303035393065333030 Sep 13 00:52:36.413000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:52:36.413000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { perfmon } for pid=2925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit[2925]: AVC avc: denied { bpf } for pid=2925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:36.413000 audit: BPF prog-id=129 op=LOAD Sep 13 00:52:36.413000 audit[2925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000325be8 items=0 ppid=2916 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:36.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323637333531663836666562666136633830303035393065333030 Sep 13 00:52:36.455575 env[1437]: time="2025-09-13T00:52:36.455546244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7wcm7,Uid:8e327c17-d03b-42c1-a4c0-cdb4d616112f,Namespace:calico-system,Attempt:0,} returns sandbox id \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\"" Sep 13 00:52:36.677684 systemd[1]: run-containerd-runc-k8s.io-205aee856a6cf8752719b9b0b6938365d790873bb28efc63d6b5bf5fa6e80f6e-runc.YwIcxn.mount: Deactivated successfully. Sep 13 00:52:37.456295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4009435116.mount: Deactivated successfully. Sep 13 00:52:38.402946 kubelet[2440]: E0913 00:52:38.402900 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:39.041361 env[1437]: time="2025-09-13T00:52:39.041313192Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.046181 env[1437]: time="2025-09-13T00:52:39.046142293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.049559 env[1437]: time="2025-09-13T00:52:39.049529464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.054347 env[1437]: time="2025-09-13T00:52:39.054314464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.055064 env[1437]: time="2025-09-13T00:52:39.055034579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 13 00:52:39.059395 env[1437]: time="2025-09-13T00:52:39.059368170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:52:39.075869 env[1437]: time="2025-09-13T00:52:39.075831115Z" level=info msg="CreateContainer within sandbox \"205aee856a6cf8752719b9b0b6938365d790873bb28efc63d6b5bf5fa6e80f6e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 13 00:52:39.098057 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970842508.mount: Deactivated successfully. Sep 13 00:52:39.114191 env[1437]: time="2025-09-13T00:52:39.113023595Z" level=info msg="CreateContainer within sandbox \"205aee856a6cf8752719b9b0b6938365d790873bb28efc63d6b5bf5fa6e80f6e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"39050da642afb994b49ed9d2e9b92739d979b50bc268679c63d0f965331dfa85\"" Sep 13 00:52:39.114191 env[1437]: time="2025-09-13T00:52:39.113729310Z" level=info msg="StartContainer for \"39050da642afb994b49ed9d2e9b92739d979b50bc268679c63d0f965331dfa85\"" Sep 13 00:52:39.146209 systemd[1]: Started cri-containerd-39050da642afb994b49ed9d2e9b92739d979b50bc268679c63d0f965331dfa85.scope. Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.160000 audit: BPF prog-id=130 op=LOAD Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2834 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339303530646136343261666239393462343965643964326539623932 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2834 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339303530646136343261666239393462343965643964326539623932 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit: BPF prog-id=131 op=LOAD Sep 13 00:52:39.161000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000202960 items=0 ppid=2834 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339303530646136343261666239393462343965643964326539623932 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit: BPF prog-id=132 op=LOAD Sep 13 00:52:39.161000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002029a8 items=0 ppid=2834 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339303530646136343261666239393462343965643964326539623932 Sep 13 00:52:39.161000 audit: BPF prog-id=132 op=UNLOAD Sep 13 00:52:39.161000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.161000 audit: BPF prog-id=133 op=LOAD Sep 13 00:52:39.161000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000202db8 items=0 ppid=2834 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339303530646136343261666239393462343965643964326539623932 Sep 13 00:52:39.194424 env[1437]: time="2025-09-13T00:52:39.194373500Z" level=info msg="StartContainer for \"39050da642afb994b49ed9d2e9b92739d979b50bc268679c63d0f965331dfa85\" returns successfully" Sep 13 00:52:39.519587 kubelet[2440]: I0913 00:52:39.519519 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5fd8674bc7-k9wqr" podStartSLOduration=1.4011037370000001 podStartE2EDuration="4.519500015s" podCreationTimestamp="2025-09-13 00:52:35 +0000 UTC" firstStartedPulling="2025-09-13 00:52:35.938719445 +0000 UTC m=+19.676989327" lastFinishedPulling="2025-09-13 00:52:39.057115623 +0000 UTC m=+22.795385605" observedRunningTime="2025-09-13 00:52:39.500736422 +0000 UTC m=+23.239006304" watchObservedRunningTime="2025-09-13 00:52:39.519500015 +0000 UTC m=+23.257769997" Sep 13 00:52:39.552779 kubelet[2440]: E0913 00:52:39.552744 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.552962 kubelet[2440]: W0913 00:52:39.552947 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.553051 kubelet[2440]: E0913 00:52:39.553039 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.553410 kubelet[2440]: E0913 00:52:39.553398 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.553510 kubelet[2440]: W0913 00:52:39.553499 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.553606 kubelet[2440]: E0913 00:52:39.553591 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.553887 kubelet[2440]: E0913 00:52:39.553877 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.553971 kubelet[2440]: W0913 00:52:39.553962 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.554040 kubelet[2440]: E0913 00:52:39.554031 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.554302 kubelet[2440]: E0913 00:52:39.554292 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.554382 kubelet[2440]: W0913 00:52:39.554373 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.554516 kubelet[2440]: E0913 00:52:39.554506 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.555008 kubelet[2440]: E0913 00:52:39.554996 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.555117 kubelet[2440]: W0913 00:52:39.555107 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.555190 kubelet[2440]: E0913 00:52:39.555180 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.555684 kubelet[2440]: E0913 00:52:39.555670 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.568198 kubelet[2440]: W0913 00:52:39.568160 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.568359 kubelet[2440]: E0913 00:52:39.568346 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.577728 kubelet[2440]: E0913 00:52:39.577706 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.577896 kubelet[2440]: W0913 00:52:39.577879 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.577982 kubelet[2440]: E0913 00:52:39.577970 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.583228 kubelet[2440]: E0913 00:52:39.583203 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.583372 kubelet[2440]: W0913 00:52:39.583356 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.583463 kubelet[2440]: E0913 00:52:39.583450 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.583826 kubelet[2440]: E0913 00:52:39.583809 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.583911 kubelet[2440]: W0913 00:52:39.583901 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.583988 kubelet[2440]: E0913 00:52:39.583978 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.584247 kubelet[2440]: E0913 00:52:39.584238 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.584331 kubelet[2440]: W0913 00:52:39.584322 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.584401 kubelet[2440]: E0913 00:52:39.584391 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.584652 kubelet[2440]: E0913 00:52:39.584643 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.584732 kubelet[2440]: W0913 00:52:39.584723 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.584796 kubelet[2440]: E0913 00:52:39.584780 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.585035 kubelet[2440]: E0913 00:52:39.585027 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.585137 kubelet[2440]: W0913 00:52:39.585128 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.585201 kubelet[2440]: E0913 00:52:39.585186 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.585500 kubelet[2440]: E0913 00:52:39.585491 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.585578 kubelet[2440]: W0913 00:52:39.585569 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.585639 kubelet[2440]: E0913 00:52:39.585625 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.585873 kubelet[2440]: E0913 00:52:39.585864 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.585953 kubelet[2440]: W0913 00:52:39.585945 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.586019 kubelet[2440]: E0913 00:52:39.586003 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.586264 kubelet[2440]: E0913 00:52:39.586255 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.586349 kubelet[2440]: W0913 00:52:39.586340 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.586419 kubelet[2440]: E0913 00:52:39.586401 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.590000 audit[3032]: NETFILTER_CFG table=filter:102 family=2 entries=21 op=nft_register_rule pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:39.590000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcd29ec560 a2=0 a3=7ffcd29ec54c items=0 ppid=2544 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.590000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:39.608732 kubelet[2440]: E0913 00:52:39.608706 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.608908 kubelet[2440]: W0913 00:52:39.608892 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.609020 kubelet[2440]: E0913 00:52:39.609008 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.609399 kubelet[2440]: E0913 00:52:39.609386 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.609510 kubelet[2440]: W0913 00:52:39.609498 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.609574 kubelet[2440]: E0913 00:52:39.609564 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.609873 kubelet[2440]: E0913 00:52:39.609860 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.609961 kubelet[2440]: W0913 00:52:39.609951 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.610025 kubelet[2440]: E0913 00:52:39.610013 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.610265 kubelet[2440]: E0913 00:52:39.610256 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.610395 kubelet[2440]: W0913 00:52:39.610385 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.610458 kubelet[2440]: E0913 00:52:39.610449 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.610722 kubelet[2440]: E0913 00:52:39.610714 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.610789 kubelet[2440]: W0913 00:52:39.610781 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.610847 kubelet[2440]: E0913 00:52:39.610837 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.611119 kubelet[2440]: E0913 00:52:39.611096 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.611195 kubelet[2440]: W0913 00:52:39.611185 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.611258 kubelet[2440]: E0913 00:52:39.611248 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.611490 kubelet[2440]: E0913 00:52:39.611480 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.611561 kubelet[2440]: W0913 00:52:39.611551 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.611621 kubelet[2440]: E0913 00:52:39.611612 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.611852 kubelet[2440]: E0913 00:52:39.611843 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.611924 kubelet[2440]: W0913 00:52:39.611914 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.611987 kubelet[2440]: E0913 00:52:39.611972 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.612227 kubelet[2440]: E0913 00:52:39.612217 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.612300 kubelet[2440]: W0913 00:52:39.612292 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.612359 kubelet[2440]: E0913 00:52:39.612349 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.612606 kubelet[2440]: E0913 00:52:39.612597 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.612677 kubelet[2440]: W0913 00:52:39.612668 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.612734 kubelet[2440]: E0913 00:52:39.612725 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.612944 kubelet[2440]: E0913 00:52:39.612937 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.613008 kubelet[2440]: W0913 00:52:39.613000 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.613068 kubelet[2440]: E0913 00:52:39.613059 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.615421 kubelet[2440]: E0913 00:52:39.615408 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.615529 kubelet[2440]: W0913 00:52:39.615515 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.615607 kubelet[2440]: E0913 00:52:39.615594 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.616281 kubelet[2440]: E0913 00:52:39.616268 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.616368 kubelet[2440]: W0913 00:52:39.616356 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.616437 kubelet[2440]: E0913 00:52:39.616426 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.616703 kubelet[2440]: E0913 00:52:39.616692 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.616790 kubelet[2440]: W0913 00:52:39.616779 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.616853 kubelet[2440]: E0913 00:52:39.616843 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.617293 kubelet[2440]: E0913 00:52:39.617283 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.617377 kubelet[2440]: W0913 00:52:39.617368 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.617436 kubelet[2440]: E0913 00:52:39.617427 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.617682 kubelet[2440]: E0913 00:52:39.617673 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.617755 kubelet[2440]: W0913 00:52:39.617747 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.617814 kubelet[2440]: E0913 00:52:39.617804 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.618222 kubelet[2440]: E0913 00:52:39.618211 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.618294 kubelet[2440]: W0913 00:52:39.618285 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.618351 kubelet[2440]: E0913 00:52:39.618341 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.619174 kubelet[2440]: E0913 00:52:39.619161 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:39.619266 kubelet[2440]: W0913 00:52:39.619256 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:39.619327 kubelet[2440]: E0913 00:52:39.619317 2440 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:39.636000 audit[3032]: NETFILTER_CFG table=nat:103 family=2 entries=19 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:39.636000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcd29ec560 a2=0 a3=7ffcd29ec54c items=0 ppid=2544 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:40.232784 env[1437]: time="2025-09-13T00:52:40.232740349Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.237536 env[1437]: time="2025-09-13T00:52:40.237503046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.240472 env[1437]: time="2025-09-13T00:52:40.240444506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.244166 env[1437]: time="2025-09-13T00:52:40.244134782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.244670 env[1437]: time="2025-09-13T00:52:40.244634792Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:52:40.247848 env[1437]: time="2025-09-13T00:52:40.247820157Z" level=info msg="CreateContainer within sandbox \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:52:40.278255 env[1437]: time="2025-09-13T00:52:40.278212879Z" level=info msg="CreateContainer within sandbox \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef\"" Sep 13 00:52:40.278941 env[1437]: time="2025-09-13T00:52:40.278906093Z" level=info msg="StartContainer for \"5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef\"" Sep 13 00:52:40.318913 systemd[1]: Started cri-containerd-5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef.scope. Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f24ae705b18 items=0 ppid=2916 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393034336235353533353232353433356138373465306161666664 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit: BPF prog-id=134 op=LOAD Sep 13 00:52:40.345000 audit[3057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00028b0f8 items=0 ppid=2916 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393034336235353533353232353433356138373465306161666664 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit: BPF prog-id=135 op=LOAD Sep 13 00:52:40.345000 audit[3057]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00028b148 items=0 ppid=2916 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393034336235353533353232353433356138373465306161666664 Sep 13 00:52:40.345000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:52:40.345000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.345000 audit: BPF prog-id=136 op=LOAD Sep 13 00:52:40.345000 audit[3057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00028b1d8 items=0 ppid=2916 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393034336235353533353232353433356138373465306161666664 Sep 13 00:52:40.369346 env[1437]: time="2025-09-13T00:52:40.369283042Z" level=info msg="StartContainer for \"5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef\" returns successfully" Sep 13 00:52:40.378214 systemd[1]: cri-containerd-5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef.scope: Deactivated successfully. Sep 13 00:52:40.381000 audit: BPF prog-id=136 op=UNLOAD Sep 13 00:52:40.403113 kubelet[2440]: E0913 00:52:40.402873 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:41.066426 systemd[1]: run-containerd-runc-k8s.io-5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef-runc.EVwLxC.mount: Deactivated successfully. Sep 13 00:52:41.066832 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef-rootfs.mount: Deactivated successfully. Sep 13 00:52:41.877334 env[1437]: time="2025-09-13T00:52:41.877252366Z" level=info msg="shim disconnected" id=5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef Sep 13 00:52:41.877334 env[1437]: time="2025-09-13T00:52:41.877333268Z" level=warning msg="cleaning up after shim disconnected" id=5a9043b55535225435a874e0aaffde2b4f88e1761ea154c5c797e3a0ca4a6aef namespace=k8s.io Sep 13 00:52:41.877822 env[1437]: time="2025-09-13T00:52:41.877345868Z" level=info msg="cleaning up dead shim" Sep 13 00:52:41.884479 env[1437]: time="2025-09-13T00:52:41.884435810Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:52:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3103 runtime=io.containerd.runc.v2\n" Sep 13 00:52:42.401640 kubelet[2440]: E0913 00:52:42.401595 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:42.497025 env[1437]: time="2025-09-13T00:52:42.496982510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:52:44.401657 kubelet[2440]: E0913 00:52:44.401604 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:46.089465 env[1437]: time="2025-09-13T00:52:46.089411327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:46.094228 env[1437]: time="2025-09-13T00:52:46.094180411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:46.097254 env[1437]: time="2025-09-13T00:52:46.097218665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:46.100896 env[1437]: time="2025-09-13T00:52:46.100868930Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:46.101351 env[1437]: time="2025-09-13T00:52:46.101315038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:52:46.103919 env[1437]: time="2025-09-13T00:52:46.103408475Z" level=info msg="CreateContainer within sandbox \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:52:46.129439 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2819615361.mount: Deactivated successfully. Sep 13 00:52:46.141663 env[1437]: time="2025-09-13T00:52:46.141619954Z" level=info msg="CreateContainer within sandbox \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2\"" Sep 13 00:52:46.142302 env[1437]: time="2025-09-13T00:52:46.142180764Z" level=info msg="StartContainer for \"e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2\"" Sep 13 00:52:46.164321 systemd[1]: Started cri-containerd-e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2.scope. Sep 13 00:52:46.218146 kernel: kauditd_printk_skb: 160 callbacks suppressed Sep 13 00:52:46.218291 kernel: audit: type=1400 audit(1757724766.196:996): avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.240587 kernel: audit: type=1300 audit(1757724766.196:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f783da45448 items=0 ppid=2916 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:46.196000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f783da45448 items=0 ppid=2916 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:46.261320 kernel: audit: type=1327 audit(1757724766.196:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363462343364623238623064623337303439363461643462383466 Sep 13 00:52:46.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363462343364623238623064623337303439363461643462383466 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.278288 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.307244 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.307325 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.323061 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.337423 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.337732 env[1437]: time="2025-09-13T00:52:46.337676035Z" level=info msg="StartContainer for \"e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2\" returns successfully" Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.354199 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.370109 kernel: audit: type=1400 audit(1757724766.196:997): avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.196000 audit: BPF prog-id=137 op=LOAD Sep 13 00:52:46.196000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00029a208 items=0 ppid=2916 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:46.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363462343364623238623064623337303439363461643462383466 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit: BPF prog-id=138 op=LOAD Sep 13 00:52:46.217000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00029a258 items=0 ppid=2916 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:46.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363462343364623238623064623337303439363461643462383466 Sep 13 00:52:46.217000 audit: BPF prog-id=138 op=UNLOAD Sep 13 00:52:46.217000 audit: BPF prog-id=137 op=UNLOAD Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:46.217000 audit: BPF prog-id=139 op=LOAD Sep 13 00:52:46.217000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00029a2e8 items=0 ppid=2916 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:46.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363462343364623238623064623337303439363461643462383466 Sep 13 00:52:46.403538 kubelet[2440]: E0913 00:52:46.401758 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:47.124820 systemd[1]: run-containerd-runc-k8s.io-e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2-runc.PzRAQD.mount: Deactivated successfully. Sep 13 00:52:47.948667 env[1437]: time="2025-09-13T00:52:47.948565360Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:52:47.950567 systemd[1]: cri-containerd-e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2.scope: Deactivated successfully. Sep 13 00:52:47.953000 audit: BPF prog-id=139 op=UNLOAD Sep 13 00:52:47.972190 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2-rootfs.mount: Deactivated successfully. Sep 13 00:52:48.031718 kubelet[2440]: I0913 00:52:48.031444 2440 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 13 00:52:48.560949 kubelet[2440]: I0913 00:52:48.176010 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a0959e8f-3150-4ab5-b305-021720265406-calico-apiserver-certs\") pod \"calico-apiserver-8cb864958-wj2gj\" (UID: \"a0959e8f-3150-4ab5-b305-021720265406\") " pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" Sep 13 00:52:48.560949 kubelet[2440]: I0913 00:52:48.176056 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dnz4h\" (UniqueName: \"kubernetes.io/projected/33589be7-c965-4ffc-b1b2-2833caab0cce-kube-api-access-dnz4h\") pod \"coredns-7c65d6cfc9-vnvl5\" (UID: \"33589be7-c965-4ffc-b1b2-2833caab0cce\") " pod="kube-system/coredns-7c65d6cfc9-vnvl5" Sep 13 00:52:48.560949 kubelet[2440]: I0913 00:52:48.176107 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rcbzt\" (UniqueName: \"kubernetes.io/projected/a0959e8f-3150-4ab5-b305-021720265406-kube-api-access-rcbzt\") pod \"calico-apiserver-8cb864958-wj2gj\" (UID: \"a0959e8f-3150-4ab5-b305-021720265406\") " pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" Sep 13 00:52:48.560949 kubelet[2440]: I0913 00:52:48.176135 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/33589be7-c965-4ffc-b1b2-2833caab0cce-config-volume\") pod \"coredns-7c65d6cfc9-vnvl5\" (UID: \"33589be7-c965-4ffc-b1b2-2833caab0cce\") " pod="kube-system/coredns-7c65d6cfc9-vnvl5" Sep 13 00:52:48.560949 kubelet[2440]: I0913 00:52:48.277170 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c304ffe6-0c72-4c7f-9f26-bb176ec81915-calico-apiserver-certs\") pod \"calico-apiserver-587c988db9-6tfqc\" (UID: \"c304ffe6-0c72-4c7f-9f26-bb176ec81915\") " pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" Sep 13 00:52:48.066762 systemd[1]: Created slice kubepods-besteffort-poda0959e8f_3150_4ab5_b305_021720265406.slice. Sep 13 00:52:48.561364 kubelet[2440]: I0913 00:52:48.277236 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r4wt7\" (UniqueName: \"kubernetes.io/projected/99aa3f02-288f-4ef2-b42b-e4dc75fa0859-kube-api-access-r4wt7\") pod \"calico-kube-controllers-7c8cdd7b4d-lhq6x\" (UID: \"99aa3f02-288f-4ef2-b42b-e4dc75fa0859\") " pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" Sep 13 00:52:48.561364 kubelet[2440]: I0913 00:52:48.277310 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8788f153-0366-40e8-8ade-35eb7591a660-whisker-ca-bundle\") pod \"whisker-84899dbc5-tpdxt\" (UID: \"8788f153-0366-40e8-8ade-35eb7591a660\") " pod="calico-system/whisker-84899dbc5-tpdxt" Sep 13 00:52:48.561364 kubelet[2440]: I0913 00:52:48.277334 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7c53f02e-113d-486a-b30d-ba8be814dd68-calico-apiserver-certs\") pod \"calico-apiserver-8cb864958-qgdmr\" (UID: \"7c53f02e-113d-486a-b30d-ba8be814dd68\") " pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" Sep 13 00:52:48.561364 kubelet[2440]: I0913 00:52:48.277352 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/8788f153-0366-40e8-8ade-35eb7591a660-whisker-backend-key-pair\") pod \"whisker-84899dbc5-tpdxt\" (UID: \"8788f153-0366-40e8-8ade-35eb7591a660\") " pod="calico-system/whisker-84899dbc5-tpdxt" Sep 13 00:52:48.561364 kubelet[2440]: I0913 00:52:48.277374 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b7b5e711-6cb4-4e5f-8005-a125a1a6f508-goldmane-ca-bundle\") pod \"goldmane-7988f88666-hgphj\" (UID: \"b7b5e711-6cb4-4e5f-8005-a125a1a6f508\") " pod="calico-system/goldmane-7988f88666-hgphj" Sep 13 00:52:48.083467 systemd[1]: Created slice kubepods-burstable-pod33589be7_c965_4ffc_b1b2_2833caab0cce.slice. Sep 13 00:52:48.561628 kubelet[2440]: I0913 00:52:48.277398 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/99aa3f02-288f-4ef2-b42b-e4dc75fa0859-tigera-ca-bundle\") pod \"calico-kube-controllers-7c8cdd7b4d-lhq6x\" (UID: \"99aa3f02-288f-4ef2-b42b-e4dc75fa0859\") " pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" Sep 13 00:52:48.561628 kubelet[2440]: I0913 00:52:48.277413 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/b7b5e711-6cb4-4e5f-8005-a125a1a6f508-config\") pod \"goldmane-7988f88666-hgphj\" (UID: \"b7b5e711-6cb4-4e5f-8005-a125a1a6f508\") " pod="calico-system/goldmane-7988f88666-hgphj" Sep 13 00:52:48.561628 kubelet[2440]: I0913 00:52:48.277428 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dr2jl\" (UniqueName: \"kubernetes.io/projected/b0dfb8da-d500-4982-a263-c9a621fcb5a2-kube-api-access-dr2jl\") pod \"coredns-7c65d6cfc9-khjw4\" (UID: \"b0dfb8da-d500-4982-a263-c9a621fcb5a2\") " pod="kube-system/coredns-7c65d6cfc9-khjw4" Sep 13 00:52:48.561628 kubelet[2440]: I0913 00:52:48.277444 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwx59\" (UniqueName: \"kubernetes.io/projected/c304ffe6-0c72-4c7f-9f26-bb176ec81915-kube-api-access-lwx59\") pod \"calico-apiserver-587c988db9-6tfqc\" (UID: \"c304ffe6-0c72-4c7f-9f26-bb176ec81915\") " pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" Sep 13 00:52:48.561628 kubelet[2440]: I0913 00:52:48.277510 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-htjn5\" (UniqueName: \"kubernetes.io/projected/7c53f02e-113d-486a-b30d-ba8be814dd68-kube-api-access-htjn5\") pod \"calico-apiserver-8cb864958-qgdmr\" (UID: \"7c53f02e-113d-486a-b30d-ba8be814dd68\") " pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" Sep 13 00:52:48.101237 systemd[1]: Created slice kubepods-besteffort-pod99aa3f02_288f_4ef2_b42b_e4dc75fa0859.slice. Sep 13 00:52:48.561940 kubelet[2440]: I0913 00:52:48.277576 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q2f7v\" (UniqueName: \"kubernetes.io/projected/8788f153-0366-40e8-8ade-35eb7591a660-kube-api-access-q2f7v\") pod \"whisker-84899dbc5-tpdxt\" (UID: \"8788f153-0366-40e8-8ade-35eb7591a660\") " pod="calico-system/whisker-84899dbc5-tpdxt" Sep 13 00:52:48.561940 kubelet[2440]: I0913 00:52:48.277604 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b0dfb8da-d500-4982-a263-c9a621fcb5a2-config-volume\") pod \"coredns-7c65d6cfc9-khjw4\" (UID: \"b0dfb8da-d500-4982-a263-c9a621fcb5a2\") " pod="kube-system/coredns-7c65d6cfc9-khjw4" Sep 13 00:52:48.561940 kubelet[2440]: I0913 00:52:48.277639 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/b7b5e711-6cb4-4e5f-8005-a125a1a6f508-goldmane-key-pair\") pod \"goldmane-7988f88666-hgphj\" (UID: \"b7b5e711-6cb4-4e5f-8005-a125a1a6f508\") " pod="calico-system/goldmane-7988f88666-hgphj" Sep 13 00:52:48.561940 kubelet[2440]: I0913 00:52:48.277668 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxmc7\" (UniqueName: \"kubernetes.io/projected/b7b5e711-6cb4-4e5f-8005-a125a1a6f508-kube-api-access-nxmc7\") pod \"goldmane-7988f88666-hgphj\" (UID: \"b7b5e711-6cb4-4e5f-8005-a125a1a6f508\") " pod="calico-system/goldmane-7988f88666-hgphj" Sep 13 00:52:48.115600 systemd[1]: Created slice kubepods-besteffort-pod7c53f02e_113d_486a_b30d_ba8be814dd68.slice. Sep 13 00:52:48.122466 systemd[1]: Created slice kubepods-burstable-podb0dfb8da_d500_4982_a263_c9a621fcb5a2.slice. Sep 13 00:52:48.136476 systemd[1]: Created slice kubepods-besteffort-podc304ffe6_0c72_4c7f_9f26_bb176ec81915.slice. Sep 13 00:52:48.146869 systemd[1]: Created slice kubepods-besteffort-podb7b5e711_6cb4_4e5f_8005_a125a1a6f508.slice. Sep 13 00:52:48.152796 systemd[1]: Created slice kubepods-besteffort-pod8788f153_0366_40e8_8ade_35eb7591a660.slice. Sep 13 00:52:48.406069 systemd[1]: Created slice kubepods-besteffort-pod4907e1ce_43d8_48b4_8598_39a3ca3ac943.slice. Sep 13 00:52:48.563779 env[1437]: time="2025-09-13T00:52:48.563336610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w7jh7,Uid:4907e1ce-43d8-48b4-8598-39a3ca3ac943,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:48.864602 env[1437]: time="2025-09-13T00:52:48.864264316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-wj2gj,Uid:a0959e8f-3150-4ab5-b305-021720265406,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:52:48.887696 env[1437]: time="2025-09-13T00:52:48.887657513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-khjw4,Uid:b0dfb8da-d500-4982-a263-c9a621fcb5a2,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:48.889125 env[1437]: time="2025-09-13T00:52:48.889074837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-qgdmr,Uid:7c53f02e-113d-486a-b30d-ba8be814dd68,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:52:48.889427 env[1437]: time="2025-09-13T00:52:48.889401342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-vnvl5,Uid:33589be7-c965-4ffc-b1b2-2833caab0cce,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:48.901630 env[1437]: time="2025-09-13T00:52:48.901222543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-587c988db9-6tfqc,Uid:c304ffe6-0c72-4c7f-9f26-bb176ec81915,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:52:48.901630 env[1437]: time="2025-09-13T00:52:48.901424346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-84899dbc5-tpdxt,Uid:8788f153-0366-40e8-8ade-35eb7591a660,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:48.901630 env[1437]: time="2025-09-13T00:52:48.901489848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-hgphj,Uid:b7b5e711-6cb4-4e5f-8005-a125a1a6f508,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:48.908218 env[1437]: time="2025-09-13T00:52:48.908192561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c8cdd7b4d-lhq6x,Uid:99aa3f02-288f-4ef2-b42b-e4dc75fa0859,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:49.215073 env[1437]: time="2025-09-13T00:52:49.214862884Z" level=info msg="shim disconnected" id=e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2 Sep 13 00:52:49.215073 env[1437]: time="2025-09-13T00:52:49.215012686Z" level=warning msg="cleaning up after shim disconnected" id=e064b43db28b0db3704964ad4b84fdbea1384a8d93b07a5b8e3cadc3691da2d2 namespace=k8s.io Sep 13 00:52:49.215073 env[1437]: time="2025-09-13T00:52:49.215027286Z" level=info msg="cleaning up dead shim" Sep 13 00:52:49.225520 env[1437]: time="2025-09-13T00:52:49.225475760Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:52:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3202 runtime=io.containerd.runc.v2\n" Sep 13 00:52:49.513031 env[1437]: time="2025-09-13T00:52:49.512923628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:52:49.672482 env[1437]: time="2025-09-13T00:52:49.672423474Z" level=error msg="Failed to destroy network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.675838 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b-shm.mount: Deactivated successfully. Sep 13 00:52:49.677482 env[1437]: time="2025-09-13T00:52:49.677425757Z" level=error msg="encountered an error cleaning up failed sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.677581 env[1437]: time="2025-09-13T00:52:49.677500858Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-84899dbc5-tpdxt,Uid:8788f153-0366-40e8-8ade-35eb7591a660,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.678314 kubelet[2440]: E0913 00:52:49.677735 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.678314 kubelet[2440]: E0913 00:52:49.677834 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-84899dbc5-tpdxt" Sep 13 00:52:49.678314 kubelet[2440]: E0913 00:52:49.677863 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-84899dbc5-tpdxt" Sep 13 00:52:49.678700 kubelet[2440]: E0913 00:52:49.677928 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-84899dbc5-tpdxt_calico-system(8788f153-0366-40e8-8ade-35eb7591a660)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-84899dbc5-tpdxt_calico-system(8788f153-0366-40e8-8ade-35eb7591a660)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-84899dbc5-tpdxt" podUID="8788f153-0366-40e8-8ade-35eb7591a660" Sep 13 00:52:49.703975 env[1437]: time="2025-09-13T00:52:49.703917996Z" level=error msg="Failed to destroy network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.707314 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a-shm.mount: Deactivated successfully. Sep 13 00:52:49.708766 env[1437]: time="2025-09-13T00:52:49.708719176Z" level=error msg="encountered an error cleaning up failed sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.708936 env[1437]: time="2025-09-13T00:52:49.708902579Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w7jh7,Uid:4907e1ce-43d8-48b4-8598-39a3ca3ac943,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.709258 kubelet[2440]: E0913 00:52:49.709208 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.709346 kubelet[2440]: E0913 00:52:49.709287 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:49.709346 kubelet[2440]: E0913 00:52:49.709316 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w7jh7" Sep 13 00:52:49.709430 kubelet[2440]: E0913 00:52:49.709371 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-w7jh7_calico-system(4907e1ce-43d8-48b4-8598-39a3ca3ac943)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-w7jh7_calico-system(4907e1ce-43d8-48b4-8598-39a3ca3ac943)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:49.773209 env[1437]: time="2025-09-13T00:52:49.773075243Z" level=error msg="Failed to destroy network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.776828 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18-shm.mount: Deactivated successfully. Sep 13 00:52:49.778300 env[1437]: time="2025-09-13T00:52:49.778256729Z" level=error msg="encountered an error cleaning up failed sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.778455 env[1437]: time="2025-09-13T00:52:49.778424132Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-wj2gj,Uid:a0959e8f-3150-4ab5-b305-021720265406,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.778842 kubelet[2440]: E0913 00:52:49.778791 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.778928 kubelet[2440]: E0913 00:52:49.778858 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" Sep 13 00:52:49.778928 kubelet[2440]: E0913 00:52:49.778882 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" Sep 13 00:52:49.779010 kubelet[2440]: E0913 00:52:49.778932 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8cb864958-wj2gj_calico-apiserver(a0959e8f-3150-4ab5-b305-021720265406)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8cb864958-wj2gj_calico-apiserver(a0959e8f-3150-4ab5-b305-021720265406)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" podUID="a0959e8f-3150-4ab5-b305-021720265406" Sep 13 00:52:49.781964 env[1437]: time="2025-09-13T00:52:49.781923290Z" level=error msg="Failed to destroy network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.786385 env[1437]: time="2025-09-13T00:52:49.785800055Z" level=error msg="encountered an error cleaning up failed sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.786385 env[1437]: time="2025-09-13T00:52:49.785865256Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-khjw4,Uid:b0dfb8da-d500-4982-a263-c9a621fcb5a2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.784916 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb-shm.mount: Deactivated successfully. Sep 13 00:52:49.787065 kubelet[2440]: E0913 00:52:49.786696 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.787065 kubelet[2440]: E0913 00:52:49.786757 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-khjw4" Sep 13 00:52:49.787065 kubelet[2440]: E0913 00:52:49.786781 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-khjw4" Sep 13 00:52:49.787253 kubelet[2440]: E0913 00:52:49.786843 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-khjw4_kube-system(b0dfb8da-d500-4982-a263-c9a621fcb5a2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-khjw4_kube-system(b0dfb8da-d500-4982-a263-c9a621fcb5a2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-khjw4" podUID="b0dfb8da-d500-4982-a263-c9a621fcb5a2" Sep 13 00:52:49.823999 env[1437]: time="2025-09-13T00:52:49.823929087Z" level=error msg="Failed to destroy network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.826049 env[1437]: time="2025-09-13T00:52:49.825982421Z" level=error msg="encountered an error cleaning up failed sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.826166 env[1437]: time="2025-09-13T00:52:49.826073123Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-vnvl5,Uid:33589be7-c965-4ffc-b1b2-2833caab0cce,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.826434 kubelet[2440]: E0913 00:52:49.826384 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.826522 kubelet[2440]: E0913 00:52:49.826462 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-vnvl5" Sep 13 00:52:49.826522 kubelet[2440]: E0913 00:52:49.826506 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-vnvl5" Sep 13 00:52:49.826643 kubelet[2440]: E0913 00:52:49.826586 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-vnvl5_kube-system(33589be7-c965-4ffc-b1b2-2833caab0cce)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-vnvl5_kube-system(33589be7-c965-4ffc-b1b2-2833caab0cce)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-vnvl5" podUID="33589be7-c965-4ffc-b1b2-2833caab0cce" Sep 13 00:52:49.839533 env[1437]: time="2025-09-13T00:52:49.839486745Z" level=error msg="Failed to destroy network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.840241 env[1437]: time="2025-09-13T00:52:49.840206357Z" level=error msg="encountered an error cleaning up failed sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.840326 env[1437]: time="2025-09-13T00:52:49.840265758Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-qgdmr,Uid:7c53f02e-113d-486a-b30d-ba8be814dd68,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.840478 kubelet[2440]: E0913 00:52:49.840442 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.840551 kubelet[2440]: E0913 00:52:49.840504 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" Sep 13 00:52:49.840551 kubelet[2440]: E0913 00:52:49.840530 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" Sep 13 00:52:49.840630 kubelet[2440]: E0913 00:52:49.840576 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8cb864958-qgdmr_calico-apiserver(7c53f02e-113d-486a-b30d-ba8be814dd68)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8cb864958-qgdmr_calico-apiserver(7c53f02e-113d-486a-b30d-ba8be814dd68)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" podUID="7c53f02e-113d-486a-b30d-ba8be814dd68" Sep 13 00:52:49.844713 env[1437]: time="2025-09-13T00:52:49.844672431Z" level=error msg="Failed to destroy network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.845231 env[1437]: time="2025-09-13T00:52:49.845189640Z" level=error msg="encountered an error cleaning up failed sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.845434 env[1437]: time="2025-09-13T00:52:49.845374243Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-587c988db9-6tfqc,Uid:c304ffe6-0c72-4c7f-9f26-bb176ec81915,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.845783 kubelet[2440]: E0913 00:52:49.845719 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.845943 kubelet[2440]: E0913 00:52:49.845766 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" Sep 13 00:52:49.845943 kubelet[2440]: E0913 00:52:49.845901 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" Sep 13 00:52:49.848191 kubelet[2440]: E0913 00:52:49.846748 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-587c988db9-6tfqc_calico-apiserver(c304ffe6-0c72-4c7f-9f26-bb176ec81915)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-587c988db9-6tfqc_calico-apiserver(c304ffe6-0c72-4c7f-9f26-bb176ec81915)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" podUID="c304ffe6-0c72-4c7f-9f26-bb176ec81915" Sep 13 00:52:49.848529 env[1437]: time="2025-09-13T00:52:49.848494895Z" level=error msg="Failed to destroy network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.848931 env[1437]: time="2025-09-13T00:52:49.848896101Z" level=error msg="encountered an error cleaning up failed sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.849072 env[1437]: time="2025-09-13T00:52:49.849037504Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-hgphj,Uid:b7b5e711-6cb4-4e5f-8005-a125a1a6f508,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.849367 kubelet[2440]: E0913 00:52:49.849343 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.849436 kubelet[2440]: E0913 00:52:49.849384 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-7988f88666-hgphj" Sep 13 00:52:49.849436 kubelet[2440]: E0913 00:52:49.849410 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-7988f88666-hgphj" Sep 13 00:52:49.849520 kubelet[2440]: E0913 00:52:49.849473 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-7988f88666-hgphj_calico-system(b7b5e711-6cb4-4e5f-8005-a125a1a6f508)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-7988f88666-hgphj_calico-system(b7b5e711-6cb4-4e5f-8005-a125a1a6f508)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-7988f88666-hgphj" podUID="b7b5e711-6cb4-4e5f-8005-a125a1a6f508" Sep 13 00:52:49.856498 env[1437]: time="2025-09-13T00:52:49.856460027Z" level=error msg="Failed to destroy network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.856809 env[1437]: time="2025-09-13T00:52:49.856779032Z" level=error msg="encountered an error cleaning up failed sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.856894 env[1437]: time="2025-09-13T00:52:49.856830333Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c8cdd7b4d-lhq6x,Uid:99aa3f02-288f-4ef2-b42b-e4dc75fa0859,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.857075 kubelet[2440]: E0913 00:52:49.857043 2440 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:49.857166 kubelet[2440]: E0913 00:52:49.857103 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" Sep 13 00:52:49.857166 kubelet[2440]: E0913 00:52:49.857126 2440 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" Sep 13 00:52:49.857249 kubelet[2440]: E0913 00:52:49.857171 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7c8cdd7b4d-lhq6x_calico-system(99aa3f02-288f-4ef2-b42b-e4dc75fa0859)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7c8cdd7b4d-lhq6x_calico-system(99aa3f02-288f-4ef2-b42b-e4dc75fa0859)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" podUID="99aa3f02-288f-4ef2-b42b-e4dc75fa0859" Sep 13 00:52:50.518824 kubelet[2440]: I0913 00:52:50.518756 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:52:50.521018 env[1437]: time="2025-09-13T00:52:50.520932659Z" level=info msg="StopPodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\"" Sep 13 00:52:50.538267 kubelet[2440]: I0913 00:52:50.538239 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:52:50.540492 env[1437]: time="2025-09-13T00:52:50.540434375Z" level=info msg="StopPodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\"" Sep 13 00:52:50.544321 kubelet[2440]: I0913 00:52:50.544296 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:52:50.545848 env[1437]: time="2025-09-13T00:52:50.545812763Z" level=info msg="StopPodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\"" Sep 13 00:52:50.547304 kubelet[2440]: I0913 00:52:50.546928 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:52:50.549147 env[1437]: time="2025-09-13T00:52:50.547535291Z" level=info msg="StopPodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\"" Sep 13 00:52:50.556711 kubelet[2440]: I0913 00:52:50.556690 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:52:50.558791 env[1437]: time="2025-09-13T00:52:50.558754373Z" level=info msg="StopPodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\"" Sep 13 00:52:50.577398 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845-shm.mount: Deactivated successfully. Sep 13 00:52:50.577509 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d-shm.mount: Deactivated successfully. Sep 13 00:52:50.577580 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab-shm.mount: Deactivated successfully. Sep 13 00:52:50.577655 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd-shm.mount: Deactivated successfully. Sep 13 00:52:50.577725 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448-shm.mount: Deactivated successfully. Sep 13 00:52:50.585034 kubelet[2440]: I0913 00:52:50.585012 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:52:50.587517 env[1437]: time="2025-09-13T00:52:50.587482439Z" level=info msg="StopPodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\"" Sep 13 00:52:50.613474 kubelet[2440]: I0913 00:52:50.613443 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:52:50.614655 env[1437]: time="2025-09-13T00:52:50.614619879Z" level=info msg="StopPodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\"" Sep 13 00:52:50.616462 kubelet[2440]: I0913 00:52:50.616039 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:52:50.616733 env[1437]: time="2025-09-13T00:52:50.616707113Z" level=info msg="StopPodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\"" Sep 13 00:52:50.618405 kubelet[2440]: I0913 00:52:50.618008 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:52:50.618695 env[1437]: time="2025-09-13T00:52:50.618653544Z" level=info msg="StopPodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\"" Sep 13 00:52:50.620776 env[1437]: time="2025-09-13T00:52:50.620736878Z" level=error msg="StopPodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" failed" error="failed to destroy network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.621037 kubelet[2440]: E0913 00:52:50.621011 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:52:50.621122 kubelet[2440]: E0913 00:52:50.621061 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d"} Sep 13 00:52:50.621173 kubelet[2440]: E0913 00:52:50.621142 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7b5e711-6cb4-4e5f-8005-a125a1a6f508\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.621256 kubelet[2440]: E0913 00:52:50.621172 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7b5e711-6cb4-4e5f-8005-a125a1a6f508\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-7988f88666-hgphj" podUID="b7b5e711-6cb4-4e5f-8005-a125a1a6f508" Sep 13 00:52:50.681027 env[1437]: time="2025-09-13T00:52:50.680964755Z" level=error msg="StopPodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" failed" error="failed to destroy network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.684931 env[1437]: time="2025-09-13T00:52:50.684889219Z" level=error msg="StopPodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" failed" error="failed to destroy network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.685282 kubelet[2440]: E0913 00:52:50.685236 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:52:50.685610 kubelet[2440]: E0913 00:52:50.685299 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb"} Sep 13 00:52:50.685610 kubelet[2440]: E0913 00:52:50.685341 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b0dfb8da-d500-4982-a263-c9a621fcb5a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.685610 kubelet[2440]: E0913 00:52:50.685373 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b0dfb8da-d500-4982-a263-c9a621fcb5a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-khjw4" podUID="b0dfb8da-d500-4982-a263-c9a621fcb5a2" Sep 13 00:52:50.712456 env[1437]: time="2025-09-13T00:52:50.712393265Z" level=error msg="StopPodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" failed" error="failed to destroy network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.713496 kubelet[2440]: E0913 00:52:50.713138 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:52:50.713496 kubelet[2440]: E0913 00:52:50.713201 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b"} Sep 13 00:52:50.713496 kubelet[2440]: E0913 00:52:50.713293 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:52:50.713496 kubelet[2440]: E0913 00:52:50.713317 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd"} Sep 13 00:52:50.713496 kubelet[2440]: E0913 00:52:50.713243 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8788f153-0366-40e8-8ade-35eb7591a660\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.713799 kubelet[2440]: E0913 00:52:50.713367 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8788f153-0366-40e8-8ade-35eb7591a660\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-84899dbc5-tpdxt" podUID="8788f153-0366-40e8-8ade-35eb7591a660" Sep 13 00:52:50.713799 kubelet[2440]: E0913 00:52:50.713438 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"33589be7-c965-4ffc-b1b2-2833caab0cce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.713799 kubelet[2440]: E0913 00:52:50.713463 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"33589be7-c965-4ffc-b1b2-2833caab0cce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-vnvl5" podUID="33589be7-c965-4ffc-b1b2-2833caab0cce" Sep 13 00:52:50.726214 env[1437]: time="2025-09-13T00:52:50.726161189Z" level=error msg="StopPodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" failed" error="failed to destroy network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.726713 kubelet[2440]: E0913 00:52:50.726542 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:52:50.726713 kubelet[2440]: E0913 00:52:50.726601 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448"} Sep 13 00:52:50.726713 kubelet[2440]: E0913 00:52:50.726644 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c53f02e-113d-486a-b30d-ba8be814dd68\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.726713 kubelet[2440]: E0913 00:52:50.726683 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c53f02e-113d-486a-b30d-ba8be814dd68\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" podUID="7c53f02e-113d-486a-b30d-ba8be814dd68" Sep 13 00:52:50.753693 env[1437]: time="2025-09-13T00:52:50.753631734Z" level=error msg="StopPodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" failed" error="failed to destroy network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.754224 kubelet[2440]: E0913 00:52:50.754000 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:52:50.754224 kubelet[2440]: E0913 00:52:50.754064 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a"} Sep 13 00:52:50.754224 kubelet[2440]: E0913 00:52:50.754131 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.754224 kubelet[2440]: E0913 00:52:50.754167 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4907e1ce-43d8-48b4-8598-39a3ca3ac943\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w7jh7" podUID="4907e1ce-43d8-48b4-8598-39a3ca3ac943" Sep 13 00:52:50.796169 env[1437]: time="2025-09-13T00:52:50.794235893Z" level=error msg="StopPodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" failed" error="failed to destroy network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.796638 kubelet[2440]: E0913 00:52:50.796435 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:52:50.796638 kubelet[2440]: E0913 00:52:50.796510 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab"} Sep 13 00:52:50.796638 kubelet[2440]: E0913 00:52:50.796565 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c304ffe6-0c72-4c7f-9f26-bb176ec81915\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.796638 kubelet[2440]: E0913 00:52:50.796597 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c304ffe6-0c72-4c7f-9f26-bb176ec81915\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" podUID="c304ffe6-0c72-4c7f-9f26-bb176ec81915" Sep 13 00:52:50.821262 env[1437]: time="2025-09-13T00:52:50.821153730Z" level=error msg="StopPodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" failed" error="failed to destroy network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.821773 kubelet[2440]: E0913 00:52:50.821721 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:52:50.821887 kubelet[2440]: E0913 00:52:50.821794 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18"} Sep 13 00:52:50.821887 kubelet[2440]: E0913 00:52:50.821838 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0959e8f-3150-4ab5-b305-021720265406\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.821887 kubelet[2440]: E0913 00:52:50.821865 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0959e8f-3150-4ab5-b305-021720265406\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" podUID="a0959e8f-3150-4ab5-b305-021720265406" Sep 13 00:52:50.823068 env[1437]: time="2025-09-13T00:52:50.823011260Z" level=error msg="StopPodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" failed" error="failed to destroy network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:50.823559 kubelet[2440]: E0913 00:52:50.823393 2440 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:52:50.823559 kubelet[2440]: E0913 00:52:50.823437 2440 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845"} Sep 13 00:52:50.823559 kubelet[2440]: E0913 00:52:50.823487 2440 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"99aa3f02-288f-4ef2-b42b-e4dc75fa0859\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:50.823559 kubelet[2440]: E0913 00:52:50.823518 2440 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"99aa3f02-288f-4ef2-b42b-e4dc75fa0859\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" podUID="99aa3f02-288f-4ef2-b42b-e4dc75fa0859" Sep 13 00:52:56.520997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1390778241.mount: Deactivated successfully. Sep 13 00:52:56.552655 env[1437]: time="2025-09-13T00:52:56.552610529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:56.557393 env[1437]: time="2025-09-13T00:52:56.557360596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:56.560242 env[1437]: time="2025-09-13T00:52:56.560216937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:56.563109 env[1437]: time="2025-09-13T00:52:56.563067278Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:56.563491 env[1437]: time="2025-09-13T00:52:56.563457383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:52:56.581497 env[1437]: time="2025-09-13T00:52:56.581462040Z" level=info msg="CreateContainer within sandbox \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:52:56.614080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1948397790.mount: Deactivated successfully. Sep 13 00:52:56.626892 env[1437]: time="2025-09-13T00:52:56.626855787Z" level=info msg="CreateContainer within sandbox \"e0267351f86febfa6c8000590e300804652a3e19385edf96dc32534f3613a354\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647\"" Sep 13 00:52:56.628202 env[1437]: time="2025-09-13T00:52:56.627445696Z" level=info msg="StartContainer for \"104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647\"" Sep 13 00:52:56.645679 systemd[1]: Started cri-containerd-104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647.scope. Sep 13 00:52:56.662000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.683691 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:52:56.683817 kernel: audit: type=1400 audit(1757724776.662:1003): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.662000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa8992dac48 items=0 ppid=2916 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.706315 kernel: audit: type=1300 audit(1757724776.662:1003): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa8992dac48 items=0 ppid=2916 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.706488 kernel: audit: type=1327 audit(1757724776.662:1003): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346534376138396664373438633831636661353033386238613238 Sep 13 00:52:56.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346534376138396664373438633831636661353033386238613238 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.758048 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.758172 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.790452 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.790572 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.790731 env[1437]: time="2025-09-13T00:52:56.774590193Z" level=info msg="StartContainer for \"104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647\" returns successfully" Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.821357 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.821430 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.823110 kernel: audit: type=1400 audit(1757724776.663:1004): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.663000 audit: BPF prog-id=140 op=LOAD Sep 13 00:52:56.663000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e7c58 items=0 ppid=2916 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346534376138396664373438633831636661353033386238613238 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit: BPF prog-id=141 op=LOAD Sep 13 00:52:56.682000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002e7ca8 items=0 ppid=2916 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346534376138396664373438633831636661353033386238613238 Sep 13 00:52:56.682000 audit: BPF prog-id=141 op=UNLOAD Sep 13 00:52:56.682000 audit: BPF prog-id=140 op=UNLOAD Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.682000 audit: BPF prog-id=142 op=LOAD Sep 13 00:52:56.682000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002e7d38 items=0 ppid=2916 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346534376138396664373438633831636661353033386238613238 Sep 13 00:52:57.170788 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:52:57.170916 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:52:57.264804 env[1437]: time="2025-09-13T00:52:57.264759504Z" level=info msg="StopPodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\"" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.350 [INFO][3655] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.351 [INFO][3655] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" iface="eth0" netns="/var/run/netns/cni-416e1f75-1bc6-fbf0-a3b5-874eb2e95d74" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.351 [INFO][3655] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" iface="eth0" netns="/var/run/netns/cni-416e1f75-1bc6-fbf0-a3b5-874eb2e95d74" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.351 [INFO][3655] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" iface="eth0" netns="/var/run/netns/cni-416e1f75-1bc6-fbf0-a3b5-874eb2e95d74" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.351 [INFO][3655] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.351 [INFO][3655] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.387 [INFO][3668] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.390 [INFO][3668] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.390 [INFO][3668] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.404 [WARNING][3668] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.404 [INFO][3668] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.405 [INFO][3668] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:57.411166 env[1437]: 2025-09-13 00:52:57.408 [INFO][3655] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:52:57.411967 env[1437]: time="2025-09-13T00:52:57.411921859Z" level=info msg="TearDown network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" successfully" Sep 13 00:52:57.412119 env[1437]: time="2025-09-13T00:52:57.412065361Z" level=info msg="StopPodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" returns successfully" Sep 13 00:52:57.447193 kubelet[2440]: I0913 00:52:57.447080 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8788f153-0366-40e8-8ade-35eb7591a660-whisker-ca-bundle\") pod \"8788f153-0366-40e8-8ade-35eb7591a660\" (UID: \"8788f153-0366-40e8-8ade-35eb7591a660\") " Sep 13 00:52:57.447634 kubelet[2440]: I0913 00:52:57.447616 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/8788f153-0366-40e8-8ade-35eb7591a660-whisker-backend-key-pair\") pod \"8788f153-0366-40e8-8ade-35eb7591a660\" (UID: \"8788f153-0366-40e8-8ade-35eb7591a660\") " Sep 13 00:52:57.447735 kubelet[2440]: I0913 00:52:57.447723 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-q2f7v\" (UniqueName: \"kubernetes.io/projected/8788f153-0366-40e8-8ade-35eb7591a660-kube-api-access-q2f7v\") pod \"8788f153-0366-40e8-8ade-35eb7591a660\" (UID: \"8788f153-0366-40e8-8ade-35eb7591a660\") " Sep 13 00:52:57.448474 kubelet[2440]: I0913 00:52:57.448447 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/8788f153-0366-40e8-8ade-35eb7591a660-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "8788f153-0366-40e8-8ade-35eb7591a660" (UID: "8788f153-0366-40e8-8ade-35eb7591a660"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Sep 13 00:52:57.453228 kubelet[2440]: I0913 00:52:57.453200 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/8788f153-0366-40e8-8ade-35eb7591a660-kube-api-access-q2f7v" (OuterVolumeSpecName: "kube-api-access-q2f7v") pod "8788f153-0366-40e8-8ade-35eb7591a660" (UID: "8788f153-0366-40e8-8ade-35eb7591a660"). InnerVolumeSpecName "kube-api-access-q2f7v". PluginName "kubernetes.io/projected", VolumeGidValue "" Sep 13 00:52:57.453777 kubelet[2440]: I0913 00:52:57.453754 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/8788f153-0366-40e8-8ade-35eb7591a660-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "8788f153-0366-40e8-8ade-35eb7591a660" (UID: "8788f153-0366-40e8-8ade-35eb7591a660"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" Sep 13 00:52:57.522400 systemd[1]: run-netns-cni\x2d416e1f75\x2d1bc6\x2dfbf0\x2da3b5\x2d874eb2e95d74.mount: Deactivated successfully. Sep 13 00:52:57.522515 systemd[1]: var-lib-kubelet-pods-8788f153\x2d0366\x2d40e8\x2d8ade\x2d35eb7591a660-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dq2f7v.mount: Deactivated successfully. Sep 13 00:52:57.522600 systemd[1]: var-lib-kubelet-pods-8788f153\x2d0366\x2d40e8\x2d8ade\x2d35eb7591a660-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 13 00:52:57.548045 kubelet[2440]: I0913 00:52:57.548011 2440 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-q2f7v\" (UniqueName: \"kubernetes.io/projected/8788f153-0366-40e8-8ade-35eb7591a660-kube-api-access-q2f7v\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:52:57.548293 kubelet[2440]: I0913 00:52:57.548276 2440 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8788f153-0366-40e8-8ade-35eb7591a660-whisker-ca-bundle\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:52:57.548408 kubelet[2440]: I0913 00:52:57.548396 2440 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/8788f153-0366-40e8-8ade-35eb7591a660-whisker-backend-key-pair\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:52:57.641031 systemd[1]: Removed slice kubepods-besteffort-pod8788f153_0366_40e8_8ade_35eb7591a660.slice. Sep 13 00:52:57.658343 kubelet[2440]: I0913 00:52:57.658289 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-7wcm7" podStartSLOduration=2.550578271 podStartE2EDuration="22.658271099s" podCreationTimestamp="2025-09-13 00:52:35 +0000 UTC" firstStartedPulling="2025-09-13 00:52:36.456587867 +0000 UTC m=+20.194857749" lastFinishedPulling="2025-09-13 00:52:56.564280595 +0000 UTC m=+40.302550577" observedRunningTime="2025-09-13 00:52:57.656553775 +0000 UTC m=+41.394823757" watchObservedRunningTime="2025-09-13 00:52:57.658271099 +0000 UTC m=+41.396540981" Sep 13 00:52:57.711379 systemd[1]: Created slice kubepods-besteffort-podeff7a5a1_31ac_48d6_809e_6ed3a248620c.slice. Sep 13 00:52:57.750060 kubelet[2440]: I0913 00:52:57.750020 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eff7a5a1-31ac-48d6-809e-6ed3a248620c-whisker-ca-bundle\") pod \"whisker-7cf8df7b78-grpjq\" (UID: \"eff7a5a1-31ac-48d6-809e-6ed3a248620c\") " pod="calico-system/whisker-7cf8df7b78-grpjq" Sep 13 00:52:57.750257 kubelet[2440]: I0913 00:52:57.750081 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-phdnd\" (UniqueName: \"kubernetes.io/projected/eff7a5a1-31ac-48d6-809e-6ed3a248620c-kube-api-access-phdnd\") pod \"whisker-7cf8df7b78-grpjq\" (UID: \"eff7a5a1-31ac-48d6-809e-6ed3a248620c\") " pod="calico-system/whisker-7cf8df7b78-grpjq" Sep 13 00:52:57.750257 kubelet[2440]: I0913 00:52:57.750130 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/eff7a5a1-31ac-48d6-809e-6ed3a248620c-whisker-backend-key-pair\") pod \"whisker-7cf8df7b78-grpjq\" (UID: \"eff7a5a1-31ac-48d6-809e-6ed3a248620c\") " pod="calico-system/whisker-7cf8df7b78-grpjq" Sep 13 00:52:58.015199 env[1437]: time="2025-09-13T00:52:58.015064378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7cf8df7b78-grpjq,Uid:eff7a5a1-31ac-48d6-809e-6ed3a248620c,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:58.204745 systemd-networkd[1595]: cali0a7fe15d0ec: Link UP Sep 13 00:52:58.217530 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:52:58.217634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a7fe15d0ec: link becomes ready Sep 13 00:52:58.218009 systemd-networkd[1595]: cali0a7fe15d0ec: Gained carrier Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.072 [INFO][3690] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.084 [INFO][3690] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0 whisker-7cf8df7b78- calico-system eff7a5a1-31ac-48d6-809e-6ed3a248620c 940 0 2025-09-13 00:52:57 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7cf8df7b78 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f whisker-7cf8df7b78-grpjq eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali0a7fe15d0ec [] [] }} ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.084 [INFO][3690] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.107 [INFO][3702] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" HandleID="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.107 [INFO][3702] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" HandleID="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5640), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"whisker-7cf8df7b78-grpjq", "timestamp":"2025-09-13 00:52:58.107252739 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.107 [INFO][3702] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.107 [INFO][3702] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.107 [INFO][3702] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.113 [INFO][3702] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.116 [INFO][3702] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.119 [INFO][3702] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.120 [INFO][3702] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.121 [INFO][3702] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.121 [INFO][3702] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.122 [INFO][3702] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.128 [INFO][3702] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.136 [INFO][3702] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.193/26] block=192.168.110.192/26 handle="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.136 [INFO][3702] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.193/26] handle="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.136 [INFO][3702] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:58.240890 env[1437]: 2025-09-13 00:52:58.136 [INFO][3702] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.193/26] IPv6=[] ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" HandleID="k8s-pod-network.310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.241883 env[1437]: 2025-09-13 00:52:58.138 [INFO][3690] cni-plugin/k8s.go 418: Populated endpoint ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0", GenerateName:"whisker-7cf8df7b78-", Namespace:"calico-system", SelfLink:"", UID:"eff7a5a1-31ac-48d6-809e-6ed3a248620c", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7cf8df7b78", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"whisker-7cf8df7b78-grpjq", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali0a7fe15d0ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:58.241883 env[1437]: 2025-09-13 00:52:58.138 [INFO][3690] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.193/32] ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.241883 env[1437]: 2025-09-13 00:52:58.138 [INFO][3690] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0a7fe15d0ec ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.241883 env[1437]: 2025-09-13 00:52:58.220 [INFO][3690] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.241883 env[1437]: 2025-09-13 00:52:58.220 [INFO][3690] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0", GenerateName:"whisker-7cf8df7b78-", Namespace:"calico-system", SelfLink:"", UID:"eff7a5a1-31ac-48d6-809e-6ed3a248620c", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7cf8df7b78", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f", Pod:"whisker-7cf8df7b78-grpjq", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali0a7fe15d0ec", MAC:"32:3f:f4:48:30:c1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:58.241883 env[1437]: 2025-09-13 00:52:58.238 [INFO][3690] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f" Namespace="calico-system" Pod="whisker-7cf8df7b78-grpjq" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--7cf8df7b78--grpjq-eth0" Sep 13 00:52:58.256608 env[1437]: time="2025-09-13T00:52:58.256069875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:58.256752 env[1437]: time="2025-09-13T00:52:58.256597382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:58.256832 env[1437]: time="2025-09-13T00:52:58.256802485Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:58.257070 env[1437]: time="2025-09-13T00:52:58.257038488Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f pid=3724 runtime=io.containerd.runc.v2 Sep 13 00:52:58.269300 systemd[1]: Started cri-containerd-310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f.scope. Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit: BPF prog-id=143 op=LOAD Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331306534323032653263323738346263363661623132356537643532 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331306534323032653263323738346263363661623132356537643532 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.282000 audit: BPF prog-id=144 op=LOAD Sep 13 00:52:58.282000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001ba9f0 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331306534323032653263323738346263363661623132356537643532 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit: BPF prog-id=145 op=LOAD Sep 13 00:52:58.283000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001baa38 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331306534323032653263323738346263363661623132356537643532 Sep 13 00:52:58.283000 audit: BPF prog-id=145 op=UNLOAD Sep 13 00:52:58.283000 audit: BPF prog-id=144 op=UNLOAD Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.283000 audit: BPF prog-id=146 op=LOAD Sep 13 00:52:58.283000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001bae48 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331306534323032653263323738346263363661623132356537643532 Sep 13 00:52:58.312217 env[1437]: time="2025-09-13T00:52:58.310837124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7cf8df7b78-grpjq,Uid:eff7a5a1-31ac-48d6-809e-6ed3a248620c,Namespace:calico-system,Attempt:0,} returns sandbox id \"310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f\"" Sep 13 00:52:58.313661 env[1437]: time="2025-09-13T00:52:58.313626462Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 13 00:52:58.410327 kubelet[2440]: I0913 00:52:58.410290 2440 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="8788f153-0366-40e8-8ade-35eb7591a660" path="/var/lib/kubelet/pods/8788f153-0366-40e8-8ade-35eb7591a660/volumes" Sep 13 00:52:58.667000 audit[3807]: AVC avc: denied { write } for pid=3807 comm="tee" name="fd" dev="proc" ino=29375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.671000 audit[3805]: AVC avc: denied { write } for pid=3805 comm="tee" name="fd" dev="proc" ino=29378 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.667000 audit[3807]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbbabd7d4 a2=241 a3=1b6 items=1 ppid=3768 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.667000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:52:58.667000 audit: PATH item=0 name="/dev/fd/63" inode=30411 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.667000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.671000 audit[3805]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd4d117d3 a2=241 a3=1b6 items=1 ppid=3777 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.671000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:52:58.671000 audit: PATH item=0 name="/dev/fd/63" inode=29366 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.671000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.678000 audit[3810]: AVC avc: denied { write } for pid=3810 comm="tee" name="fd" dev="proc" ino=29383 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.680000 audit[3816]: AVC avc: denied { write } for pid=3816 comm="tee" name="fd" dev="proc" ino=29386 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.678000 audit[3810]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff91eb27c3 a2=241 a3=1b6 items=1 ppid=3772 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.678000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:52:58.678000 audit: PATH item=0 name="/dev/fd/63" inode=30414 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.678000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.680000 audit[3816]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc535857c4 a2=241 a3=1b6 items=1 ppid=3770 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.680000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:52:58.680000 audit: PATH item=0 name="/dev/fd/63" inode=30418 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.705000 audit[3833]: AVC avc: denied { write } for pid=3833 comm="tee" name="fd" dev="proc" ino=29400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.712000 audit[3839]: AVC avc: denied { write } for pid=3839 comm="tee" name="fd" dev="proc" ino=29404 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.705000 audit[3833]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa1bba7d5 a2=241 a3=1b6 items=1 ppid=3776 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.705000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:52:58.705000 audit: PATH item=0 name="/dev/fd/63" inode=30423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.705000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.717000 audit[3843]: AVC avc: denied { write } for pid=3843 comm="tee" name="fd" dev="proc" ino=29408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:58.712000 audit[3839]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd22b647d3 a2=241 a3=1b6 items=1 ppid=3785 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.712000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:52:58.712000 audit: PATH item=0 name="/dev/fd/63" inode=29392 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.712000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.717000 audit[3843]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4e8477d3 a2=241 a3=1b6 items=1 ppid=3773 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.717000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:52:58.717000 audit: PATH item=0 name="/dev/fd/63" inode=29401 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:58.717000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.955000 audit: BPF prog-id=147 op=LOAD Sep 13 00:52:58.955000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfa9289d0 a2=98 a3=1fffffffffffffff items=0 ppid=3779 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.955000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:58.957000 audit: BPF prog-id=147 op=UNLOAD Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.957000 audit: BPF prog-id=148 op=LOAD Sep 13 00:52:58.957000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfa9288b0 a2=94 a3=3 items=0 ppid=3779 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.957000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:58.958000 audit: BPF prog-id=148 op=UNLOAD Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.958000 audit: BPF prog-id=149 op=LOAD Sep 13 00:52:58.958000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfa9288f0 a2=94 a3=7ffcfa928ad0 items=0 ppid=3779 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.958000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:58.959000 audit: BPF prog-id=149 op=UNLOAD Sep 13 00:52:58.959000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.959000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcfa9289c0 a2=50 a3=a000000085 items=0 ppid=3779 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.959000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit: BPF prog-id=150 op=LOAD Sep 13 00:52:58.961000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeaeca4ee0 a2=98 a3=3 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.961000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:58.961000 audit: BPF prog-id=150 op=UNLOAD Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit: BPF prog-id=151 op=LOAD Sep 13 00:52:58.961000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeaeca4cd0 a2=94 a3=54428f items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.961000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:58.961000 audit: BPF prog-id=151 op=UNLOAD Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.961000 audit: BPF prog-id=152 op=LOAD Sep 13 00:52:58.961000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeaeca4d00 a2=94 a3=2 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.961000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:58.961000 audit: BPF prog-id=152 op=UNLOAD Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit: BPF prog-id=153 op=LOAD Sep 13 00:52:59.087000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeaeca4bc0 a2=94 a3=1 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.087000 audit: BPF prog-id=153 op=UNLOAD Sep 13 00:52:59.087000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.087000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeaeca4c90 a2=50 a3=7ffeaeca4d70 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaeca4bd0 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaeca4c00 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaeca4b10 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaeca4c20 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaeca4c00 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaeca4bf0 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaeca4c20 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaeca4c00 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaeca4c20 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaeca4bf0 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.096000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.096000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaeca4c60 a2=28 a3=0 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeaeca4a10 a2=50 a3=1 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit: BPF prog-id=154 op=LOAD Sep 13 00:52:59.097000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeaeca4a10 a2=94 a3=5 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.097000 audit: BPF prog-id=154 op=UNLOAD Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeaeca4ac0 a2=50 a3=1 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeaeca4be0 a2=4 a3=38 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { confidentiality } for pid=3859 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:59.097000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeaeca4c30 a2=94 a3=6 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.097000 audit[3859]: AVC avc: denied { confidentiality } for pid=3859 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:59.097000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeaeca43e0 a2=94 a3=88 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.098000 audit[3859]: AVC avc: denied { confidentiality } for pid=3859 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:59.098000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeaeca43e0 a2=94 a3=88 items=0 ppid=3779 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit: BPF prog-id=155 op=LOAD Sep 13 00:52:59.106000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4de496e0 a2=98 a3=1999999999999999 items=0 ppid=3779 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.106000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:52:59.106000 audit: BPF prog-id=155 op=UNLOAD Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit: BPF prog-id=156 op=LOAD Sep 13 00:52:59.106000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4de495c0 a2=94 a3=ffff items=0 ppid=3779 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.106000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:52:59.106000 audit: BPF prog-id=156 op=UNLOAD Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.106000 audit: BPF prog-id=157 op=LOAD Sep 13 00:52:59.106000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4de49600 a2=94 a3=7fff4de497e0 items=0 ppid=3779 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.106000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:52:59.106000 audit: BPF prog-id=157 op=UNLOAD Sep 13 00:52:59.264248 systemd-networkd[1595]: cali0a7fe15d0ec: Gained IPv6LL Sep 13 00:52:59.309638 systemd-networkd[1595]: vxlan.calico: Link UP Sep 13 00:52:59.309648 systemd-networkd[1595]: vxlan.calico: Gained carrier Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit: BPF prog-id=158 op=LOAD Sep 13 00:52:59.333000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdf03db30 a2=98 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.333000 audit: BPF prog-id=158 op=UNLOAD Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit: BPF prog-id=159 op=LOAD Sep 13 00:52:59.333000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdf03d940 a2=94 a3=54428f items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.333000 audit: BPF prog-id=159 op=UNLOAD Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit: BPF prog-id=160 op=LOAD Sep 13 00:52:59.333000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdf03d970 a2=94 a3=2 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.333000 audit: BPF prog-id=160 op=UNLOAD Sep 13 00:52:59.333000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.333000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffdf03d840 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdf03d870 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdf03d780 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffdf03d890 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffdf03d870 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffdf03d860 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffdf03d890 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdf03d870 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdf03d890 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdf03d860 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffdf03d8d0 a2=28 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.334000 audit: BPF prog-id=161 op=LOAD Sep 13 00:52:59.334000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffdf03d740 a2=94 a3=0 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.334000 audit: BPF prog-id=161 op=UNLOAD Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffdf03d730 a2=50 a3=2800 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffdf03d730 a2=50 a3=2800 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit: BPF prog-id=162 op=LOAD Sep 13 00:52:59.335000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffdf03cf50 a2=94 a3=2 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.335000 audit: BPF prog-id=162 op=UNLOAD Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.335000 audit: BPF prog-id=163 op=LOAD Sep 13 00:52:59.335000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffdf03d050 a2=94 a3=30 items=0 ppid=3779 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit: BPF prog-id=164 op=LOAD Sep 13 00:52:59.339000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdda3cede0 a2=98 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.339000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.339000 audit: BPF prog-id=164 op=UNLOAD Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit: BPF prog-id=165 op=LOAD Sep 13 00:52:59.339000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdda3cebd0 a2=94 a3=54428f items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.339000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.339000 audit: BPF prog-id=165 op=UNLOAD Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.339000 audit: BPF prog-id=166 op=LOAD Sep 13 00:52:59.339000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdda3cec00 a2=94 a3=2 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.339000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.339000 audit: BPF prog-id=166 op=UNLOAD Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.497000 audit: BPF prog-id=167 op=LOAD Sep 13 00:52:59.497000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdda3ceac0 a2=94 a3=1 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.498000 audit: BPF prog-id=167 op=UNLOAD Sep 13 00:52:59.498000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.498000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdda3ceb90 a2=50 a3=7ffdda3cec70 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.498000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.512000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.512000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda3cead0 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.512000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.512000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda3ceb00 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.512000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.512000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda3cea10 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.512000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.512000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda3ceb20 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.513000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.513000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda3ceb00 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.513000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.513000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.513000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda3ceaf0 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.513000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda3ceb20 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda3ceb00 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda3ceb20 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda3ceaf0 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda3ceb60 a2=28 a3=0 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdda3ce910 a2=50 a3=1 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit: BPF prog-id=168 op=LOAD Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdda3ce910 a2=94 a3=5 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit: BPF prog-id=168 op=UNLOAD Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdda3ce9c0 a2=50 a3=1 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdda3ceae0 a2=4 a3=38 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { confidentiality } for pid=3909 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdda3ceb30 a2=94 a3=6 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.518000 audit[3909]: AVC avc: denied { confidentiality } for pid=3909 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:59.518000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdda3ce2e0 a2=94 a3=88 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { confidentiality } for pid=3909 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:59.519000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdda3ce2e0 a2=94 a3=88 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdda3cfd10 a2=10 a3=f8f00800 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdda3cfbb0 a2=10 a3=3 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdda3cfb50 a2=10 a3=3 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.519000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.519000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdda3cfb50 a2=10 a3=7 items=0 ppid=3779 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:59.530000 audit: BPF prog-id=163 op=UNLOAD Sep 13 00:52:59.530000 audit[3914]: SYSCALL arch=c000003e syscall=46 success=yes exit=32 a0=3 a1=7ffe05393da0 a2=0 a3=0 items=0 ppid=3779 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.530000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Sep 13 00:52:59.654718 env[1437]: time="2025-09-13T00:52:59.654674229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.660915 env[1437]: time="2025-09-13T00:52:59.660884112Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.666823 env[1437]: time="2025-09-13T00:52:59.666791391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.669969 env[1437]: time="2025-09-13T00:52:59.669941033Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.670399 env[1437]: time="2025-09-13T00:52:59.670370439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 13 00:52:59.673523 env[1437]: time="2025-09-13T00:52:59.673489181Z" level=info msg="CreateContainer within sandbox \"310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 13 00:52:59.714970 env[1437]: time="2025-09-13T00:52:59.714927236Z" level=info msg="CreateContainer within sandbox \"310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"61d4862d3ff6fd714db9a820470e4fa34175ef6f31d8389f5e732162ba20a71a\"" Sep 13 00:52:59.715659 env[1437]: time="2025-09-13T00:52:59.715621946Z" level=info msg="StartContainer for \"61d4862d3ff6fd714db9a820470e4fa34175ef6f31d8389f5e732162ba20a71a\"" Sep 13 00:52:59.753020 systemd[1]: run-containerd-runc-k8s.io-61d4862d3ff6fd714db9a820470e4fa34175ef6f31d8389f5e732162ba20a71a-runc.fyniyJ.mount: Deactivated successfully. Sep 13 00:52:59.757520 systemd[1]: Started cri-containerd-61d4862d3ff6fd714db9a820470e4fa34175ef6f31d8389f5e732162ba20a71a.scope. Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.776000 audit: BPF prog-id=169 op=LOAD Sep 13 00:52:59.777000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.777000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3724 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643438363264336666366664373134646239613832303437306534 Sep 13 00:52:59.777000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.777000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3724 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643438363264336666366664373134646239613832303437306534 Sep 13 00:52:59.780000 audit[3963]: NETFILTER_CFG table=mangle:104 family=2 entries=16 op=nft_register_chain pid=3963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit: BPF prog-id=170 op=LOAD Sep 13 00:52:59.780000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ebdb0 items=0 ppid=3724 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643438363264336666366664373134646239613832303437306534 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit: BPF prog-id=171 op=LOAD Sep 13 00:52:59.780000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ebdf8 items=0 ppid=3724 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643438363264336666366664373134646239613832303437306534 Sep 13 00:52:59.780000 audit: BPF prog-id=171 op=UNLOAD Sep 13 00:52:59.780000 audit: BPF prog-id=170 op=UNLOAD Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.780000 audit: BPF prog-id=172 op=LOAD Sep 13 00:52:59.780000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ca208 items=0 ppid=3724 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643438363264336666366664373134646239613832303437306534 Sep 13 00:52:59.780000 audit[3963]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffecdc93240 a2=0 a3=7ffecdc9322c items=0 ppid=3779 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.780000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:59.819542 env[1437]: time="2025-09-13T00:52:59.819496238Z" level=info msg="StartContainer for \"61d4862d3ff6fd714db9a820470e4fa34175ef6f31d8389f5e732162ba20a71a\" returns successfully" Sep 13 00:52:59.825216 env[1437]: time="2025-09-13T00:52:59.825182014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 13 00:52:59.824000 audit[3956]: AVC avc: denied { search } for pid=3956 comm="nginx" name="crypto" dev="proc" ino=30774 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c360 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:52:59.824000 audit[3956]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2b42edf728 a2=0 a3=0 items=0 ppid=3724 pid=3956 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c360 key=(null) Sep 13 00:52:59.824000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 13 00:52:59.832000 audit[3964]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=3964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:59.832000 audit[3964]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd9a8dbb40 a2=0 a3=7ffd9a8dbb2c items=0 ppid=3779 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.832000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:59.882000 audit[3961]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=3961 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:59.882000 audit[3961]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff96474040 a2=0 a3=7fff9647402c items=0 ppid=3779 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.882000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:59.902000 audit[3965]: NETFILTER_CFG table=filter:107 family=2 entries=94 op=nft_register_chain pid=3965 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:59.902000 audit[3965]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7ffc193143e0 a2=0 a3=55bffba25000 items=0 ppid=3779 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.902000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:01.184244 systemd-networkd[1595]: vxlan.calico: Gained IPv6LL Sep 13 00:53:01.402920 env[1437]: time="2025-09-13T00:53:01.402222479Z" level=info msg="StopPodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\"" Sep 13 00:53:01.403979 env[1437]: time="2025-09-13T00:53:01.403949501Z" level=info msg="StopPodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\"" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.480 [INFO][4013] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.480 [INFO][4013] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" iface="eth0" netns="/var/run/netns/cni-01d558ec-7a46-7652-a631-4081a4f469d9" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.480 [INFO][4013] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" iface="eth0" netns="/var/run/netns/cni-01d558ec-7a46-7652-a631-4081a4f469d9" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.481 [INFO][4013] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" iface="eth0" netns="/var/run/netns/cni-01d558ec-7a46-7652-a631-4081a4f469d9" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.481 [INFO][4013] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.481 [INFO][4013] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.521 [INFO][4025] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.521 [INFO][4025] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.521 [INFO][4025] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.532 [WARNING][4025] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.532 [INFO][4025] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.534 [INFO][4025] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:01.536541 env[1437]: 2025-09-13 00:53:01.535 [INFO][4013] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:01.540867 systemd[1]: run-netns-cni\x2d01d558ec\x2d7a46\x2d7652\x2da631\x2d4081a4f469d9.mount: Deactivated successfully. Sep 13 00:53:01.542304 env[1437]: time="2025-09-13T00:53:01.542272983Z" level=info msg="TearDown network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" successfully" Sep 13 00:53:01.542375 env[1437]: time="2025-09-13T00:53:01.542363584Z" level=info msg="StopPodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" returns successfully" Sep 13 00:53:01.543049 env[1437]: time="2025-09-13T00:53:01.543022093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-hgphj,Uid:b7b5e711-6cb4-4e5f-8005-a125a1a6f508,Namespace:calico-system,Attempt:1,}" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.499 [INFO][4012] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.499 [INFO][4012] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" iface="eth0" netns="/var/run/netns/cni-6d8bf239-991a-7111-d36c-ebb6a0e7aa6f" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.499 [INFO][4012] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" iface="eth0" netns="/var/run/netns/cni-6d8bf239-991a-7111-d36c-ebb6a0e7aa6f" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.500 [INFO][4012] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" iface="eth0" netns="/var/run/netns/cni-6d8bf239-991a-7111-d36c-ebb6a0e7aa6f" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.500 [INFO][4012] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.500 [INFO][4012] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.567 [INFO][4030] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.567 [INFO][4030] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.568 [INFO][4030] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.573 [WARNING][4030] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.573 [INFO][4030] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.574 [INFO][4030] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:01.577799 env[1437]: 2025-09-13 00:53:01.576 [INFO][4012] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:01.582684 env[1437]: time="2025-09-13T00:53:01.581472788Z" level=info msg="TearDown network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" successfully" Sep 13 00:53:01.582684 env[1437]: time="2025-09-13T00:53:01.581522789Z" level=info msg="StopPodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" returns successfully" Sep 13 00:53:01.581281 systemd[1]: run-netns-cni\x2d6d8bf239\x2d991a\x2d7111\x2dd36c\x2debb6a0e7aa6f.mount: Deactivated successfully. Sep 13 00:53:01.583275 env[1437]: time="2025-09-13T00:53:01.583236711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-khjw4,Uid:b0dfb8da-d500-4982-a263-c9a621fcb5a2,Namespace:kube-system,Attempt:1,}" Sep 13 00:53:02.020461 systemd-networkd[1595]: cali0ba98df1fbb: Link UP Sep 13 00:53:02.033674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:02.033768 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ba98df1fbb: link becomes ready Sep 13 00:53:02.034478 systemd-networkd[1595]: cali0ba98df1fbb: Gained carrier Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.920 [INFO][4038] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0 goldmane-7988f88666- calico-system b7b5e711-6cb4-4e5f-8005-a125a1a6f508 959 0 2025-09-13 00:52:35 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:7988f88666 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f goldmane-7988f88666-hgphj eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali0ba98df1fbb [] [] }} ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.920 [INFO][4038] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.962 [INFO][4060] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" HandleID="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.962 [INFO][4060] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" HandleID="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd0a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"goldmane-7988f88666-hgphj", "timestamp":"2025-09-13 00:53:01.962628698 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.965 [INFO][4060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.965 [INFO][4060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.965 [INFO][4060] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.981 [INFO][4060] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.987 [INFO][4060] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.991 [INFO][4060] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.993 [INFO][4060] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.995 [INFO][4060] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.995 [INFO][4060] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:01.997 [INFO][4060] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2 Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:02.005 [INFO][4060] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:02.013 [INFO][4060] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.194/26] block=192.168.110.192/26 handle="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:02.013 [INFO][4060] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.194/26] handle="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:02.013 [INFO][4060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:02.055336 env[1437]: 2025-09-13 00:53:02.013 [INFO][4060] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.194/26] IPv6=[] ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" HandleID="k8s-pod-network.10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.056396 env[1437]: 2025-09-13 00:53:02.016 [INFO][4038] cni-plugin/k8s.go 418: Populated endpoint ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"b7b5e711-6cb4-4e5f-8005-a125a1a6f508", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"goldmane-7988f88666-hgphj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0ba98df1fbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:02.056396 env[1437]: 2025-09-13 00:53:02.016 [INFO][4038] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.194/32] ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.056396 env[1437]: 2025-09-13 00:53:02.016 [INFO][4038] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0ba98df1fbb ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.056396 env[1437]: 2025-09-13 00:53:02.035 [INFO][4038] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.056396 env[1437]: 2025-09-13 00:53:02.035 [INFO][4038] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"b7b5e711-6cb4-4e5f-8005-a125a1a6f508", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2", Pod:"goldmane-7988f88666-hgphj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0ba98df1fbb", MAC:"fe:36:52:af:59:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:02.056396 env[1437]: 2025-09-13 00:53:02.052 [INFO][4038] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2" Namespace="calico-system" Pod="goldmane-7988f88666-hgphj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:02.084000 audit[4085]: NETFILTER_CFG table=filter:108 family=2 entries=44 op=nft_register_chain pid=4085 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:02.091315 kernel: kauditd_printk_skb: 709 callbacks suppressed Sep 13 00:53:02.091416 kernel: audit: type=1325 audit(1757724782.084:1155): table=filter:108 family=2 entries=44 op=nft_register_chain pid=4085 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:02.104935 env[1437]: time="2025-09-13T00:53:02.099263634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:02.104935 env[1437]: time="2025-09-13T00:53:02.099297634Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:02.104935 env[1437]: time="2025-09-13T00:53:02.099308934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:02.104935 env[1437]: time="2025-09-13T00:53:02.099722639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2 pid=4091 runtime=io.containerd.runc.v2 Sep 13 00:53:02.084000 audit[4085]: SYSCALL arch=c000003e syscall=46 success=yes exit=25180 a0=3 a1=7ffd541f5930 a2=0 a3=7ffd541f591c items=0 ppid=3779 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.130332 systemd[1]: Started cri-containerd-10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2.scope. Sep 13 00:53:02.131491 kernel: audit: type=1300 audit(1757724782.084:1155): arch=c000003e syscall=46 success=yes exit=25180 a0=3 a1=7ffd541f5930 a2=0 a3=7ffd541f591c items=0 ppid=3779 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.084000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:02.152164 kernel: audit: type=1327 audit(1757724782.084:1155): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:02.190112 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3dc150a46b: link becomes ready Sep 13 00:53:02.190474 systemd-networkd[1595]: calie3dc150a46b: Link UP Sep 13 00:53:02.190712 systemd-networkd[1595]: calie3dc150a46b: Gained carrier Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.216237 kernel: audit: type=1400 audit(1757724782.199:1156): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.235099 kernel: audit: type=1400 audit(1757724782.199:1157): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:01.979 [INFO][4048] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0 coredns-7c65d6cfc9- kube-system b0dfb8da-d500-4982-a263-c9a621fcb5a2 960 0 2025-09-13 00:52:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f coredns-7c65d6cfc9-khjw4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie3dc150a46b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:01.980 [INFO][4048] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.059 [INFO][4069] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" HandleID="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.059 [INFO][4069] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" HandleID="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325490), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"coredns-7c65d6cfc9-khjw4", "timestamp":"2025-09-13 00:53:02.059344429 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.059 [INFO][4069] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.059 [INFO][4069] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.059 [INFO][4069] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.082 [INFO][4069] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.107 [INFO][4069] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.154 [INFO][4069] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.156 [INFO][4069] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.158 [INFO][4069] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.158 [INFO][4069] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.159 [INFO][4069] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.164 [INFO][4069] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.178 [INFO][4069] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.195/26] block=192.168.110.192/26 handle="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.178 [INFO][4069] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.195/26] handle="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.178 [INFO][4069] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:02.247470 env[1437]: 2025-09-13 00:53:02.178 [INFO][4069] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.195/26] IPv6=[] ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" HandleID="k8s-pod-network.a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.248291 env[1437]: 2025-09-13 00:53:02.181 [INFO][4048] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b0dfb8da-d500-4982-a263-c9a621fcb5a2", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"coredns-7c65d6cfc9-khjw4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3dc150a46b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:02.248291 env[1437]: 2025-09-13 00:53:02.181 [INFO][4048] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.195/32] ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.248291 env[1437]: 2025-09-13 00:53:02.181 [INFO][4048] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie3dc150a46b ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.248291 env[1437]: 2025-09-13 00:53:02.190 [INFO][4048] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.248291 env[1437]: 2025-09-13 00:53:02.191 [INFO][4048] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b0dfb8da-d500-4982-a263-c9a621fcb5a2", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c", Pod:"coredns-7c65d6cfc9-khjw4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3dc150a46b", MAC:"62:42:ef:6a:fa:ed", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:02.248291 env[1437]: 2025-09-13 00:53:02.243 [INFO][4048] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-khjw4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.265517 kernel: audit: type=1400 audit(1757724782.199:1158): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.285849 kernel: audit: type=1400 audit(1757724782.199:1159): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.306158 kernel: audit: type=1400 audit(1757724782.199:1160): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.306230 kernel: audit: type=1400 audit(1757724782.199:1161): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.339871 env[1437]: time="2025-09-13T00:53:02.326496704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:02.339871 env[1437]: time="2025-09-13T00:53:02.326560605Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:02.339871 env[1437]: time="2025-09-13T00:53:02.326584005Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:02.339871 env[1437]: time="2025-09-13T00:53:02.326720707Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c pid=4133 runtime=io.containerd.runc.v2 Sep 13 00:53:02.340143 kernel: audit: type=1400 audit(1757724782.199:1162): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.232000 audit: BPF prog-id=173 op=LOAD Sep 13 00:53:02.235000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.235000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4091 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613930623634626563333065363462323537396434323766306238 Sep 13 00:53:02.236000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.236000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4091 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613930623634626563333065363462323537396434323766306238 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit: BPF prog-id=174 op=LOAD Sep 13 00:53:02.241000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257ce0 items=0 ppid=4091 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613930623634626563333065363462323537396434323766306238 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit: BPF prog-id=175 op=LOAD Sep 13 00:53:02.241000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d28 items=0 ppid=4091 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613930623634626563333065363462323537396434323766306238 Sep 13 00:53:02.241000 audit: BPF prog-id=175 op=UNLOAD Sep 13 00:53:02.241000 audit: BPF prog-id=174 op=UNLOAD Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.241000 audit: BPF prog-id=176 op=LOAD Sep 13 00:53:02.241000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003da138 items=0 ppid=4091 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613930623634626563333065363462323537396434323766306238 Sep 13 00:53:02.388109 systemd[1]: Started cri-containerd-a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c.scope. Sep 13 00:53:02.403508 env[1437]: time="2025-09-13T00:53:02.403460576Z" level=info msg="StopPodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\"" Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.414000 audit: BPF prog-id=177 op=LOAD Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001d7c48 a2=10 a3=1c items=0 ppid=4133 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383962396263626463666538383765353934656133346533376630 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001d76b0 a2=3c a3=c items=0 ppid=4133 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383962396263626463666538383765353934656133346533376630 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit: BPF prog-id=178 op=LOAD Sep 13 00:53:02.415000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001d79d8 a2=78 a3=c0002c3dc0 items=0 ppid=4133 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383962396263626463666538383765353934656133346533376630 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit: BPF prog-id=179 op=LOAD Sep 13 00:53:02.415000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001d7770 a2=78 a3=c0002c3e08 items=0 ppid=4133 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383962396263626463666538383765353934656133346533376630 Sep 13 00:53:02.415000 audit: BPF prog-id=179 op=UNLOAD Sep 13 00:53:02.415000 audit: BPF prog-id=178 op=UNLOAD Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { perfmon } for pid=4142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit[4142]: AVC avc: denied { bpf } for pid=4142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.415000 audit: BPF prog-id=180 op=LOAD Sep 13 00:53:02.415000 audit[4142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001d7c30 a2=78 a3=c00038e218 items=0 ppid=4133 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383962396263626463666538383765353934656133346533376630 Sep 13 00:53:02.424353 env[1437]: time="2025-09-13T00:53:02.424310939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-hgphj,Uid:b7b5e711-6cb4-4e5f-8005-a125a1a6f508,Namespace:calico-system,Attempt:1,} returns sandbox id \"10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2\"" Sep 13 00:53:02.436000 audit[4178]: NETFILTER_CFG table=filter:109 family=2 entries=52 op=nft_register_chain pid=4178 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:02.436000 audit[4178]: SYSCALL arch=c000003e syscall=46 success=yes exit=26592 a0=3 a1=7ffc29c9e7a0 a2=0 a3=7ffc29c9e78c items=0 ppid=3779 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:02.531789 env[1437]: time="2025-09-13T00:53:02.531738396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-khjw4,Uid:b0dfb8da-d500-4982-a263-c9a621fcb5a2,Namespace:kube-system,Attempt:1,} returns sandbox id \"a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c\"" Sep 13 00:53:02.554705 env[1437]: time="2025-09-13T00:53:02.550911539Z" level=info msg="CreateContainer within sandbox \"a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:53:02.595787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount278180593.mount: Deactivated successfully. Sep 13 00:53:02.606223 env[1437]: time="2025-09-13T00:53:02.606164137Z" level=info msg="CreateContainer within sandbox \"a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"824b200ee8bdf1e5957acc47937fefb6406fc6c161d23cbb77a42b330c6b143d\"" Sep 13 00:53:02.608576 env[1437]: time="2025-09-13T00:53:02.608547167Z" level=info msg="StartContainer for \"824b200ee8bdf1e5957acc47937fefb6406fc6c161d23cbb77a42b330c6b143d\"" Sep 13 00:53:02.669880 systemd[1]: Started cri-containerd-824b200ee8bdf1e5957acc47937fefb6406fc6c161d23cbb77a42b330c6b143d.scope. Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.570 [INFO][4179] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.570 [INFO][4179] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" iface="eth0" netns="/var/run/netns/cni-ccebedfe-aff4-6c07-73b3-231d5ef53bad" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.570 [INFO][4179] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" iface="eth0" netns="/var/run/netns/cni-ccebedfe-aff4-6c07-73b3-231d5ef53bad" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.571 [INFO][4179] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" iface="eth0" netns="/var/run/netns/cni-ccebedfe-aff4-6c07-73b3-231d5ef53bad" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.571 [INFO][4179] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.571 [INFO][4179] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.638 [INFO][4194] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.638 [INFO][4194] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.638 [INFO][4194] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.663 [WARNING][4194] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.663 [INFO][4194] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.665 [INFO][4194] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:02.678789 env[1437]: 2025-09-13 00:53:02.674 [INFO][4179] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:02.679359 env[1437]: time="2025-09-13T00:53:02.678834855Z" level=info msg="TearDown network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" successfully" Sep 13 00:53:02.679359 env[1437]: time="2025-09-13T00:53:02.678866255Z" level=info msg="StopPodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" returns successfully" Sep 13 00:53:02.680111 env[1437]: time="2025-09-13T00:53:02.679902368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w7jh7,Uid:4907e1ce-43d8-48b4-8598-39a3ca3ac943,Namespace:calico-system,Attempt:1,}" Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit: BPF prog-id=181 op=LOAD Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4133 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832346232303065653862646631653539353761636334373933376665 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4133 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832346232303065653862646631653539353761636334373933376665 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.695000 audit: BPF prog-id=182 op=LOAD Sep 13 00:53:02.695000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038ffb0 items=0 ppid=4133 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832346232303065653862646631653539353761636334373933376665 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit: BPF prog-id=183 op=LOAD Sep 13 00:53:02.696000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038fff8 items=0 ppid=4133 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832346232303065653862646631653539353761636334373933376665 Sep 13 00:53:02.696000 audit: BPF prog-id=183 op=UNLOAD Sep 13 00:53:02.696000 audit: BPF prog-id=182 op=UNLOAD Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.696000 audit: BPF prog-id=184 op=LOAD Sep 13 00:53:02.696000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003de408 items=0 ppid=4133 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832346232303065653862646631653539353761636334373933376665 Sep 13 00:53:02.729000 audit[4220]: AVC avc: denied { getattr } for pid=4220 comm="coredns" path="cgroup:[4026532733]" dev="nsfs" ino=4026532733 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c970 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:53:02.729000 audit[4220]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a9a8 a2=c0004e06b8 a3=0 items=0 ppid=4133 pid=4220 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c970 key=(null) Sep 13 00:53:02.729000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:53:02.735212 env[1437]: time="2025-09-13T00:53:02.735164166Z" level=info msg="StartContainer for \"824b200ee8bdf1e5957acc47937fefb6406fc6c161d23cbb77a42b330c6b143d\" returns successfully" Sep 13 00:53:02.874961 systemd-networkd[1595]: cali71e393380b1: Link UP Sep 13 00:53:02.885422 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali71e393380b1: link becomes ready Sep 13 00:53:02.886903 systemd-networkd[1595]: cali71e393380b1: Gained carrier Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.787 [INFO][4232] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0 csi-node-driver- calico-system 4907e1ce-43d8-48b4-8598-39a3ca3ac943 973 0 2025-09-13 00:52:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f csi-node-driver-w7jh7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali71e393380b1 [] [] }} ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.787 [INFO][4232] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.821 [INFO][4253] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" HandleID="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.821 [INFO][4253] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" HandleID="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251160), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"csi-node-driver-w7jh7", "timestamp":"2025-09-13 00:53:02.82099715 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.821 [INFO][4253] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.821 [INFO][4253] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.821 [INFO][4253] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.835 [INFO][4253] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.844 [INFO][4253] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.848 [INFO][4253] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.850 [INFO][4253] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.852 [INFO][4253] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.852 [INFO][4253] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.853 [INFO][4253] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.860 [INFO][4253] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.870 [INFO][4253] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.196/26] block=192.168.110.192/26 handle="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.870 [INFO][4253] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.196/26] handle="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.870 [INFO][4253] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:02.911825 env[1437]: 2025-09-13 00:53:02.870 [INFO][4253] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.196/26] IPv6=[] ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" HandleID="k8s-pod-network.5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.912714 env[1437]: 2025-09-13 00:53:02.872 [INFO][4232] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4907e1ce-43d8-48b4-8598-39a3ca3ac943", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"csi-node-driver-w7jh7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali71e393380b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:02.912714 env[1437]: 2025-09-13 00:53:02.872 [INFO][4232] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.196/32] ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.912714 env[1437]: 2025-09-13 00:53:02.872 [INFO][4232] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali71e393380b1 ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.912714 env[1437]: 2025-09-13 00:53:02.887 [INFO][4232] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.912714 env[1437]: 2025-09-13 00:53:02.889 [INFO][4232] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4907e1ce-43d8-48b4-8598-39a3ca3ac943", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e", Pod:"csi-node-driver-w7jh7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali71e393380b1", MAC:"6e:b9:f8:75:f9:78", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:02.912714 env[1437]: 2025-09-13 00:53:02.903 [INFO][4232] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e" Namespace="calico-system" Pod="csi-node-driver-w7jh7" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:02.933000 audit[4267]: NETFILTER_CFG table=filter:110 family=2 entries=40 op=nft_register_chain pid=4267 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:02.933000 audit[4267]: SYSCALL arch=c000003e syscall=46 success=yes exit=20748 a0=3 a1=7ffe3e91cc10 a2=0 a3=7ffe3e91cbfc items=0 ppid=3779 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.933000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:02.942681 env[1437]: time="2025-09-13T00:53:02.942627987Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:02.942820 env[1437]: time="2025-09-13T00:53:02.942798189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:02.942900 env[1437]: time="2025-09-13T00:53:02.942882190Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:02.943183 env[1437]: time="2025-09-13T00:53:02.943072292Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e pid=4275 runtime=io.containerd.runc.v2 Sep 13 00:53:02.969863 systemd[1]: Started cri-containerd-5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e.scope. Sep 13 00:53:02.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.999000 audit: BPF prog-id=185 op=LOAD Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4275 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303637633332306433306636396330616563333963366464633463 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4275 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303637633332306433306636396330616563333963366464633463 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.000000 audit: BPF prog-id=186 op=LOAD Sep 13 00:53:03.000000 audit[4286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025560 items=0 ppid=4275 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303637633332306433306636396330616563333963366464633463 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.001000 audit: BPF prog-id=187 op=LOAD Sep 13 00:53:03.001000 audit[4286]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000255a8 items=0 ppid=4275 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303637633332306433306636396330616563333963366464633463 Sep 13 00:53:03.002000 audit: BPF prog-id=187 op=UNLOAD Sep 13 00:53:03.002000 audit: BPF prog-id=186 op=UNLOAD Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { perfmon } for pid=4286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit[4286]: AVC avc: denied { bpf } for pid=4286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.002000 audit: BPF prog-id=188 op=LOAD Sep 13 00:53:03.002000 audit[4286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000259b8 items=0 ppid=4275 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303637633332306433306636396330616563333963366464633463 Sep 13 00:53:03.017166 env[1437]: time="2025-09-13T00:53:03.017126624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w7jh7,Uid:4907e1ce-43d8-48b4-8598-39a3ca3ac943,Namespace:calico-system,Attempt:1,} returns sandbox id \"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e\"" Sep 13 00:53:03.352326 env[1437]: time="2025-09-13T00:53:03.352227776Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:03.358660 env[1437]: time="2025-09-13T00:53:03.358625155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:03.361628 env[1437]: time="2025-09-13T00:53:03.361592992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:03.365457 env[1437]: time="2025-09-13T00:53:03.365427739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:03.366076 env[1437]: time="2025-09-13T00:53:03.366045047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 13 00:53:03.368943 env[1437]: time="2025-09-13T00:53:03.368912982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 13 00:53:03.369195 env[1437]: time="2025-09-13T00:53:03.369169486Z" level=info msg="CreateContainer within sandbox \"310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 13 00:53:03.402192 env[1437]: time="2025-09-13T00:53:03.402156994Z" level=info msg="StopPodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\"" Sep 13 00:53:03.402450 env[1437]: time="2025-09-13T00:53:03.402423698Z" level=info msg="StopPodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\"" Sep 13 00:53:03.402691 env[1437]: time="2025-09-13T00:53:03.402312896Z" level=info msg="CreateContainer within sandbox \"310e4202e2c2784bc66ab125e7d52ce47f5705727e431d7ec026197f0c509f2f\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"b41b3dfa6bb193e9b562ac4606f612a80b6c37665409fb6fe338208e32b7f493\"" Sep 13 00:53:03.403286 env[1437]: time="2025-09-13T00:53:03.403254308Z" level=info msg="StartContainer for \"b41b3dfa6bb193e9b562ac4606f612a80b6c37665409fb6fe338208e32b7f493\"" Sep 13 00:53:03.438518 systemd[1]: Started cri-containerd-b41b3dfa6bb193e9b562ac4606f612a80b6c37665409fb6fe338208e32b7f493.scope. Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.483000 audit: BPF prog-id=189 op=LOAD Sep 13 00:53:03.484000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.484000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3724 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316233646661366262313933653962353632616334363036663631 Sep 13 00:53:03.485000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.485000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3724 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316233646661366262313933653962353632616334363036663631 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit: BPF prog-id=190 op=LOAD Sep 13 00:53:03.489000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025bec0 items=0 ppid=3724 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316233646661366262313933653962353632616334363036663631 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit: BPF prog-id=191 op=LOAD Sep 13 00:53:03.489000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025bf08 items=0 ppid=3724 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316233646661366262313933653962353632616334363036663631 Sep 13 00:53:03.489000 audit: BPF prog-id=191 op=UNLOAD Sep 13 00:53:03.489000 audit: BPF prog-id=190 op=UNLOAD Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.489000 audit: BPF prog-id=192 op=LOAD Sep 13 00:53:03.489000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e0318 items=0 ppid=3724 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316233646661366262313933653962353632616334363036663631 Sep 13 00:53:03.545282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3686927843.mount: Deactivated successfully. Sep 13 00:53:03.545476 systemd[1]: run-netns-cni\x2dccebedfe\x2daff4\x2d6c07\x2d73b3\x2d231d5ef53bad.mount: Deactivated successfully. Sep 13 00:53:03.571496 env[1437]: time="2025-09-13T00:53:03.571449692Z" level=info msg="StartContainer for \"b41b3dfa6bb193e9b562ac4606f612a80b6c37665409fb6fe338208e32b7f493\" returns successfully" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.526 [INFO][4340] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.526 [INFO][4340] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" iface="eth0" netns="/var/run/netns/cni-3c3f592d-502c-11f2-b6cb-846bde27637d" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.526 [INFO][4340] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" iface="eth0" netns="/var/run/netns/cni-3c3f592d-502c-11f2-b6cb-846bde27637d" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.526 [INFO][4340] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" iface="eth0" netns="/var/run/netns/cni-3c3f592d-502c-11f2-b6cb-846bde27637d" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.526 [INFO][4340] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.526 [INFO][4340] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.581 [INFO][4368] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.581 [INFO][4368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.582 [INFO][4368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.589 [WARNING][4368] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.590 [INFO][4368] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.596 [INFO][4368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:03.608793 env[1437]: 2025-09-13 00:53:03.601 [INFO][4340] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:03.607003 systemd[1]: run-netns-cni\x2d3c3f592d\x2d502c\x2d11f2\x2db6cb\x2d846bde27637d.mount: Deactivated successfully. Sep 13 00:53:03.609549 env[1437]: time="2025-09-13T00:53:03.608781854Z" level=info msg="TearDown network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" successfully" Sep 13 00:53:03.609549 env[1437]: time="2025-09-13T00:53:03.608819055Z" level=info msg="StopPodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" returns successfully" Sep 13 00:53:03.609549 env[1437]: time="2025-09-13T00:53:03.609497063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-vnvl5,Uid:33589be7-c965-4ffc-b1b2-2833caab0cce,Namespace:kube-system,Attempt:1,}" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.523 [INFO][4341] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.524 [INFO][4341] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" iface="eth0" netns="/var/run/netns/cni-f555e365-5a00-1156-79d4-07a18f43a7cb" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.524 [INFO][4341] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" iface="eth0" netns="/var/run/netns/cni-f555e365-5a00-1156-79d4-07a18f43a7cb" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.525 [INFO][4341] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" iface="eth0" netns="/var/run/netns/cni-f555e365-5a00-1156-79d4-07a18f43a7cb" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.525 [INFO][4341] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.525 [INFO][4341] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.609 [INFO][4373] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.610 [INFO][4373] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.610 [INFO][4373] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.617 [WARNING][4373] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.617 [INFO][4373] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.619 [INFO][4373] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:03.624547 env[1437]: 2025-09-13 00:53:03.622 [INFO][4341] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:03.628302 env[1437]: time="2025-09-13T00:53:03.628254396Z" level=info msg="TearDown network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" successfully" Sep 13 00:53:03.628430 env[1437]: time="2025-09-13T00:53:03.628409797Z" level=info msg="StopPodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" returns successfully" Sep 13 00:53:03.629218 env[1437]: time="2025-09-13T00:53:03.629189807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-qgdmr,Uid:7c53f02e-113d-486a-b30d-ba8be814dd68,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:53:03.630466 systemd[1]: run-netns-cni\x2df555e365\x2d5a00\x2d1156\x2d79d4\x2d07a18f43a7cb.mount: Deactivated successfully. Sep 13 00:53:03.705353 kubelet[2440]: I0913 00:53:03.705203 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-7cf8df7b78-grpjq" podStartSLOduration=1.649669424 podStartE2EDuration="6.705181049s" podCreationTimestamp="2025-09-13 00:52:57 +0000 UTC" firstStartedPulling="2025-09-13 00:52:58.312124442 +0000 UTC m=+42.050394324" lastFinishedPulling="2025-09-13 00:53:03.367635967 +0000 UTC m=+47.105905949" observedRunningTime="2025-09-13 00:53:03.704416739 +0000 UTC m=+47.442686721" watchObservedRunningTime="2025-09-13 00:53:03.705181049 +0000 UTC m=+47.443451031" Sep 13 00:53:03.760000 audit[4417]: NETFILTER_CFG table=filter:111 family=2 entries=19 op=nft_register_rule pid=4417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:03.760000 audit[4417]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc7ccabaa0 a2=0 a3=7ffc7ccaba8c items=0 ppid=2544 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:03.765000 audit[4417]: NETFILTER_CFG table=nat:112 family=2 entries=21 op=nft_register_chain pid=4417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:03.765000 audit[4417]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc7ccabaa0 a2=0 a3=7ffc7ccaba8c items=0 ppid=2544 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:03.785000 audit[4420]: NETFILTER_CFG table=filter:113 family=2 entries=15 op=nft_register_rule pid=4420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:03.785000 audit[4420]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc96a48270 a2=0 a3=7ffc96a4825c items=0 ppid=2544 pid=4420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:03.792000 audit[4420]: NETFILTER_CFG table=nat:114 family=2 entries=37 op=nft_register_chain pid=4420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:03.792000 audit[4420]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffc96a48270 a2=0 a3=7ffc96a4825c items=0 ppid=2544 pid=4420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:03.882782 systemd-networkd[1595]: cali204bab31a50: Link UP Sep 13 00:53:03.897185 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:03.897269 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali204bab31a50: link becomes ready Sep 13 00:53:03.897942 systemd-networkd[1595]: cali204bab31a50: Gained carrier Sep 13 00:53:03.909657 kubelet[2440]: I0913 00:53:03.909291 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-khjw4" podStartSLOduration=42.909273177 podStartE2EDuration="42.909273177s" podCreationTimestamp="2025-09-13 00:52:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:53:03.737399648 +0000 UTC m=+47.475669530" watchObservedRunningTime="2025-09-13 00:53:03.909273177 +0000 UTC m=+47.647543159" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.773 [INFO][4400] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0 calico-apiserver-8cb864958- calico-apiserver 7c53f02e-113d-486a-b30d-ba8be814dd68 984 0 2025-09-13 00:52:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8cb864958 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f calico-apiserver-8cb864958-qgdmr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali204bab31a50 [] [] }} ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.773 [INFO][4400] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.830 [INFO][4424] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.830 [INFO][4424] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"calico-apiserver-8cb864958-qgdmr", "timestamp":"2025-09-13 00:53:03.8304181 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.830 [INFO][4424] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.830 [INFO][4424] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.831 [INFO][4424] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.843 [INFO][4424] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.849 [INFO][4424] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.856 [INFO][4424] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.859 [INFO][4424] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.863 [INFO][4424] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.863 [INFO][4424] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.865 [INFO][4424] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.870 [INFO][4424] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.877 [INFO][4424] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.197/26] block=192.168.110.192/26 handle="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.878 [INFO][4424] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.197/26] handle="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.878 [INFO][4424] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:03.913413 env[1437]: 2025-09-13 00:53:03.878 [INFO][4424] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.197/26] IPv6=[] ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.914237 env[1437]: 2025-09-13 00:53:03.879 [INFO][4400] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c53f02e-113d-486a-b30d-ba8be814dd68", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"calico-apiserver-8cb864958-qgdmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali204bab31a50", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:03.914237 env[1437]: 2025-09-13 00:53:03.879 [INFO][4400] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.197/32] ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.914237 env[1437]: 2025-09-13 00:53:03.879 [INFO][4400] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali204bab31a50 ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.914237 env[1437]: 2025-09-13 00:53:03.898 [INFO][4400] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.914237 env[1437]: 2025-09-13 00:53:03.899 [INFO][4400] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c53f02e-113d-486a-b30d-ba8be814dd68", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b", Pod:"calico-apiserver-8cb864958-qgdmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali204bab31a50", MAC:"62:55:42:ef:30:e5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:03.914237 env[1437]: 2025-09-13 00:53:03.910 [INFO][4400] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-qgdmr" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:03.928000 audit[4444]: NETFILTER_CFG table=filter:115 family=2 entries=58 op=nft_register_chain pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:03.928000 audit[4444]: SYSCALL arch=c000003e syscall=46 success=yes exit=30568 a0=3 a1=7ffefd3afcc0 a2=0 a3=7ffefd3afcac items=0 ppid=3779 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.928000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:03.931319 env[1437]: time="2025-09-13T00:53:03.931145148Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:03.931319 env[1437]: time="2025-09-13T00:53:03.931189249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:03.931319 env[1437]: time="2025-09-13T00:53:03.931204949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:03.931632 env[1437]: time="2025-09-13T00:53:03.931597954Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b pid=4452 runtime=io.containerd.runc.v2 Sep 13 00:53:03.936777 systemd-networkd[1595]: calie3dc150a46b: Gained IPv6LL Sep 13 00:53:03.947253 systemd[1]: Started cri-containerd-8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b.scope. Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.981000 audit: BPF prog-id=193 op=LOAD Sep 13 00:53:03.982000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.982000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4452 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353530303530353730656131383135306165343233383561333035 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4452 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353530303530353730656131383135306165343233383561333035 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit: BPF prog-id=194 op=LOAD Sep 13 00:53:03.983000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002ef0a0 items=0 ppid=4452 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353530303530353730656131383135306165343233383561333035 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit: BPF prog-id=195 op=LOAD Sep 13 00:53:03.983000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002ef0e8 items=0 ppid=4452 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353530303530353730656131383135306165343233383561333035 Sep 13 00:53:03.983000 audit: BPF prog-id=195 op=UNLOAD Sep 13 00:53:03.983000 audit: BPF prog-id=194 op=UNLOAD Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:03.983000 audit: BPF prog-id=196 op=LOAD Sep 13 00:53:03.983000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ef4f8 items=0 ppid=4452 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:03.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353530303530353730656131383135306165343233383561333035 Sep 13 00:53:03.992365 systemd-networkd[1595]: calib0467fbd5d6: Link UP Sep 13 00:53:03.999679 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0467fbd5d6: link becomes ready Sep 13 00:53:04.000505 systemd-networkd[1595]: calib0467fbd5d6: Gained carrier Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.770 [INFO][4391] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0 coredns-7c65d6cfc9- kube-system 33589be7-c965-4ffc-b1b2-2833caab0cce 985 0 2025-09-13 00:52:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f coredns-7c65d6cfc9-vnvl5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib0467fbd5d6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.771 [INFO][4391] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.869 [INFO][4423] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" HandleID="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.869 [INFO][4423] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" HandleID="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d56a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"coredns-7c65d6cfc9-vnvl5", "timestamp":"2025-09-13 00:53:03.86916468 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.869 [INFO][4423] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.880 [INFO][4423] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.886 [INFO][4423] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.941 [INFO][4423] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.952 [INFO][4423] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.958 [INFO][4423] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.961 [INFO][4423] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.966 [INFO][4423] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.966 [INFO][4423] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.969 [INFO][4423] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.973 [INFO][4423] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.985 [INFO][4423] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.198/26] block=192.168.110.192/26 handle="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.985 [INFO][4423] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.198/26] handle="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.985 [INFO][4423] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:04.022672 env[1437]: 2025-09-13 00:53:03.985 [INFO][4423] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.198/26] IPv6=[] ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" HandleID="k8s-pod-network.a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.023280 env[1437]: 2025-09-13 00:53:03.989 [INFO][4391] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"33589be7-c965-4ffc-b1b2-2833caab0cce", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"coredns-7c65d6cfc9-vnvl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0467fbd5d6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:04.023280 env[1437]: 2025-09-13 00:53:03.989 [INFO][4391] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.198/32] ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.023280 env[1437]: 2025-09-13 00:53:03.989 [INFO][4391] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib0467fbd5d6 ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.023280 env[1437]: 2025-09-13 00:53:04.003 [INFO][4391] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.023280 env[1437]: 2025-09-13 00:53:04.005 [INFO][4391] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"33589be7-c965-4ffc-b1b2-2833caab0cce", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b", Pod:"coredns-7c65d6cfc9-vnvl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0467fbd5d6", MAC:"76:ca:57:43:fb:57", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:04.023280 env[1437]: 2025-09-13 00:53:04.021 [INFO][4391] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-vnvl5" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:04.041690 env[1437]: time="2025-09-13T00:53:04.041632808Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:04.041880 env[1437]: time="2025-09-13T00:53:04.041856410Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:04.041989 env[1437]: time="2025-09-13T00:53:04.041967612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:04.042415 env[1437]: time="2025-09-13T00:53:04.042375717Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b pid=4491 runtime=io.containerd.runc.v2 Sep 13 00:53:04.064450 systemd[1]: Started cri-containerd-a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b.scope. Sep 13 00:53:04.065323 systemd-networkd[1595]: cali0ba98df1fbb: Gained IPv6LL Sep 13 00:53:04.077484 env[1437]: time="2025-09-13T00:53:04.077444843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-qgdmr,Uid:7c53f02e-113d-486a-b30d-ba8be814dd68,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\"" Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit: BPF prog-id=197 op=LOAD Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4491 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663166353139383232616465636332323334373032663333623434 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4491 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663166353139383232616465636332323334373032663333623434 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit: BPF prog-id=198 op=LOAD Sep 13 00:53:04.097000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034fcd0 items=0 ppid=4491 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663166353139383232616465636332323334373032663333623434 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit: BPF prog-id=199 op=LOAD Sep 13 00:53:04.097000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034fd18 items=0 ppid=4491 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663166353139383232616465636332323334373032663333623434 Sep 13 00:53:04.097000 audit: BPF prog-id=199 op=UNLOAD Sep 13 00:53:04.097000 audit: BPF prog-id=198 op=UNLOAD Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.097000 audit: BPF prog-id=200 op=LOAD Sep 13 00:53:04.097000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d6128 items=0 ppid=4491 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663166353139383232616465636332323334373032663333623434 Sep 13 00:53:04.114000 audit[4530]: NETFILTER_CFG table=filter:116 family=2 entries=44 op=nft_register_chain pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:04.114000 audit[4530]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffd53d37800 a2=0 a3=7ffd53d377ec items=0 ppid=3779 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:04.137677 env[1437]: time="2025-09-13T00:53:04.137585874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-vnvl5,Uid:33589be7-c965-4ffc-b1b2-2833caab0cce,Namespace:kube-system,Attempt:1,} returns sandbox id \"a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b\"" Sep 13 00:53:04.143052 env[1437]: time="2025-09-13T00:53:04.143018940Z" level=info msg="CreateContainer within sandbox \"a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:53:04.182228 env[1437]: time="2025-09-13T00:53:04.182184916Z" level=info msg="CreateContainer within sandbox \"a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a1df0e7b95e3d6c317634ab7ba96181885510c41f1994792ef68e4eadd842481\"" Sep 13 00:53:04.182876 env[1437]: time="2025-09-13T00:53:04.182841524Z" level=info msg="StartContainer for \"a1df0e7b95e3d6c317634ab7ba96181885510c41f1994792ef68e4eadd842481\"" Sep 13 00:53:04.198098 systemd[1]: Started cri-containerd-a1df0e7b95e3d6c317634ab7ba96181885510c41f1994792ef68e4eadd842481.scope. Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.210000 audit: BPF prog-id=201 op=LOAD Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4491 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646630653762393565336436633331373633346162376261393631 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=4491 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646630653762393565336436633331373633346162376261393631 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit: BPF prog-id=202 op=LOAD Sep 13 00:53:04.211000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00009a440 items=0 ppid=4491 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646630653762393565336436633331373633346162376261393631 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit: BPF prog-id=203 op=LOAD Sep 13 00:53:04.211000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00009a488 items=0 ppid=4491 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646630653762393565336436633331373633346162376261393631 Sep 13 00:53:04.211000 audit: BPF prog-id=203 op=UNLOAD Sep 13 00:53:04.211000 audit: BPF prog-id=202 op=UNLOAD Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.211000 audit: BPF prog-id=204 op=LOAD Sep 13 00:53:04.211000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00009a898 items=0 ppid=4491 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131646630653762393565336436633331373633346162376261393631 Sep 13 00:53:04.236543 env[1437]: time="2025-09-13T00:53:04.236500476Z" level=info msg="StartContainer for \"a1df0e7b95e3d6c317634ab7ba96181885510c41f1994792ef68e4eadd842481\" returns successfully" Sep 13 00:53:04.250000 audit[4556]: AVC avc: denied { getattr } for pid=4556 comm="coredns" path="cgroup:[4026532758]" dev="nsfs" ino=4026532758 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c825 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:53:04.250000 audit[4556]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000ccc68 a3=0 items=0 ppid=4491 pid=4556 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c825 key=(null) Sep 13 00:53:04.250000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:53:04.403931 env[1437]: time="2025-09-13T00:53:04.403819610Z" level=info msg="StopPodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\"" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.452 [INFO][4584] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.452 [INFO][4584] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" iface="eth0" netns="/var/run/netns/cni-afb5384a-48bc-cfdc-4f46-167dbade80ac" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.452 [INFO][4584] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" iface="eth0" netns="/var/run/netns/cni-afb5384a-48bc-cfdc-4f46-167dbade80ac" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.454 [INFO][4584] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" iface="eth0" netns="/var/run/netns/cni-afb5384a-48bc-cfdc-4f46-167dbade80ac" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.455 [INFO][4584] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.455 [INFO][4584] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.478 [INFO][4591] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.478 [INFO][4591] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.478 [INFO][4591] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.485 [WARNING][4591] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.485 [INFO][4591] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.486 [INFO][4591] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:04.489330 env[1437]: 2025-09-13 00:53:04.488 [INFO][4584] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:04.489901 env[1437]: time="2025-09-13T00:53:04.489471051Z" level=info msg="TearDown network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" successfully" Sep 13 00:53:04.489901 env[1437]: time="2025-09-13T00:53:04.489504152Z" level=info msg="StopPodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" returns successfully" Sep 13 00:53:04.490371 env[1437]: time="2025-09-13T00:53:04.490344362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-wj2gj,Uid:a0959e8f-3150-4ab5-b305-021720265406,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:53:04.512290 systemd-networkd[1595]: cali71e393380b1: Gained IPv6LL Sep 13 00:53:04.552664 systemd[1]: run-netns-cni\x2dafb5384a\x2d48bc\x2dcfdc\x2d4f46\x2d167dbade80ac.mount: Deactivated successfully. Sep 13 00:53:04.679397 systemd-networkd[1595]: calia8561f69b20: Link UP Sep 13 00:53:04.689181 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8561f69b20: link becomes ready Sep 13 00:53:04.689379 systemd-networkd[1595]: calia8561f69b20: Gained carrier Sep 13 00:53:04.725116 kubelet[2440]: I0913 00:53:04.722845 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-vnvl5" podStartSLOduration=43.722825988 podStartE2EDuration="43.722825988s" podCreationTimestamp="2025-09-13 00:52:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:53:04.716973817 +0000 UTC m=+48.455243799" watchObservedRunningTime="2025-09-13 00:53:04.722825988 +0000 UTC m=+48.461095870" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.582 [INFO][4598] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0 calico-apiserver-8cb864958- calico-apiserver a0959e8f-3150-4ab5-b305-021720265406 1014 0 2025-09-13 00:52:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8cb864958 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f calico-apiserver-8cb864958-wj2gj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia8561f69b20 [] [] }} ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.582 [INFO][4598] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.618 [INFO][4610] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.618 [INFO][4610] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9610), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"calico-apiserver-8cb864958-wj2gj", "timestamp":"2025-09-13 00:53:04.618032414 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.618 [INFO][4610] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.618 [INFO][4610] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.618 [INFO][4610] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.629 [INFO][4610] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.633 [INFO][4610] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.640 [INFO][4610] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.654 [INFO][4610] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.656 [INFO][4610] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.656 [INFO][4610] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.657 [INFO][4610] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4 Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.663 [INFO][4610] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.673 [INFO][4610] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.199/26] block=192.168.110.192/26 handle="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.673 [INFO][4610] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.199/26] handle="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.673 [INFO][4610] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:04.726965 env[1437]: 2025-09-13 00:53:04.673 [INFO][4610] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.199/26] IPv6=[] ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.727989 env[1437]: 2025-09-13 00:53:04.675 [INFO][4598] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0959e8f-3150-4ab5-b305-021720265406", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"calico-apiserver-8cb864958-wj2gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia8561f69b20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:04.727989 env[1437]: 2025-09-13 00:53:04.676 [INFO][4598] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.199/32] ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.727989 env[1437]: 2025-09-13 00:53:04.676 [INFO][4598] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia8561f69b20 ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.727989 env[1437]: 2025-09-13 00:53:04.690 [INFO][4598] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.727989 env[1437]: 2025-09-13 00:53:04.690 [INFO][4598] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0959e8f-3150-4ab5-b305-021720265406", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4", Pod:"calico-apiserver-8cb864958-wj2gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia8561f69b20", MAC:"fa:69:81:77:9f:5c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:04.727989 env[1437]: 2025-09-13 00:53:04.713 [INFO][4598] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Namespace="calico-apiserver" Pod="calico-apiserver-8cb864958-wj2gj" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:04.799000 audit[4626]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:04.799000 audit[4626]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe9ad95a80 a2=0 a3=7ffe9ad95a6c items=0 ppid=2544 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:04.815000 audit[4631]: NETFILTER_CFG table=filter:118 family=2 entries=53 op=nft_register_chain pid=4631 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:04.815000 audit[4631]: SYSCALL arch=c000003e syscall=46 success=yes exit=26624 a0=3 a1=7ffc0a6d4b30 a2=0 a3=7ffc0a6d4b1c items=0 ppid=3779 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:04.831000 audit[4626]: NETFILTER_CFG table=nat:119 family=2 entries=58 op=nft_register_chain pid=4626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:04.831000 audit[4626]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffe9ad95a80 a2=0 a3=7ffe9ad95a6c items=0 ppid=2544 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:04.832978 env[1437]: time="2025-09-13T00:53:04.832579322Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:04.832978 env[1437]: time="2025-09-13T00:53:04.832622322Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:04.832978 env[1437]: time="2025-09-13T00:53:04.832639123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:04.832978 env[1437]: time="2025-09-13T00:53:04.832779124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4 pid=4634 runtime=io.containerd.runc.v2 Sep 13 00:53:04.897359 systemd[1]: Started cri-containerd-5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4.scope. Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.934000 audit: BPF prog-id=205 op=LOAD Sep 13 00:53:04.936000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.936000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4634 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623635376632363733333331333033626232383263656261633635 Sep 13 00:53:04.936000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.936000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4634 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623635376632363733333331333033626232383263656261633635 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit: BPF prog-id=206 op=LOAD Sep 13 00:53:04.940000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001d5ac0 items=0 ppid=4634 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623635376632363733333331333033626232383263656261633635 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit: BPF prog-id=207 op=LOAD Sep 13 00:53:04.940000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001d5b08 items=0 ppid=4634 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623635376632363733333331333033626232383263656261633635 Sep 13 00:53:04.940000 audit: BPF prog-id=207 op=UNLOAD Sep 13 00:53:04.940000 audit: BPF prog-id=206 op=UNLOAD Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:04.940000 audit: BPF prog-id=208 op=LOAD Sep 13 00:53:04.940000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001d5f18 items=0 ppid=4634 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623635376632363733333331333033626232383263656261633635 Sep 13 00:53:05.031940 env[1437]: time="2025-09-13T00:53:05.031865237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8cb864958-wj2gj,Uid:a0959e8f-3150-4ab5-b305-021720265406,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\"" Sep 13 00:53:05.088241 systemd-networkd[1595]: calib0467fbd5d6: Gained IPv6LL Sep 13 00:53:05.216570 systemd-networkd[1595]: cali204bab31a50: Gained IPv6LL Sep 13 00:53:05.402477 env[1437]: time="2025-09-13T00:53:05.402439357Z" level=info msg="StopPodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\"" Sep 13 00:53:05.402725 env[1437]: time="2025-09-13T00:53:05.402439357Z" level=info msg="StopPodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\"" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.467 [INFO][4693] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.467 [INFO][4693] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" iface="eth0" netns="/var/run/netns/cni-b89f4245-7386-0ff4-3f2a-e9f9c8f97d37" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.470 [INFO][4693] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" iface="eth0" netns="/var/run/netns/cni-b89f4245-7386-0ff4-3f2a-e9f9c8f97d37" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.470 [INFO][4693] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" iface="eth0" netns="/var/run/netns/cni-b89f4245-7386-0ff4-3f2a-e9f9c8f97d37" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.470 [INFO][4693] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.470 [INFO][4693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.503 [INFO][4706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.504 [INFO][4706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.504 [INFO][4706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.509 [WARNING][4706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.509 [INFO][4706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.512 [INFO][4706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:05.517337 env[1437]: 2025-09-13 00:53:05.514 [INFO][4693] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:05.517337 env[1437]: time="2025-09-13T00:53:05.515551706Z" level=info msg="TearDown network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" successfully" Sep 13 00:53:05.517337 env[1437]: time="2025-09-13T00:53:05.515597207Z" level=info msg="StopPodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" returns successfully" Sep 13 00:53:05.517337 env[1437]: time="2025-09-13T00:53:05.516215714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-587c988db9-6tfqc,Uid:c304ffe6-0c72-4c7f-9f26-bb176ec81915,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:53:05.518860 systemd[1]: run-netns-cni\x2db89f4245\x2d7386\x2d0ff4\x2d3f2a\x2de9f9c8f97d37.mount: Deactivated successfully. Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.490 [INFO][4694] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.490 [INFO][4694] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" iface="eth0" netns="/var/run/netns/cni-68bf87c7-9db4-963d-98d4-3517dedacda8" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.491 [INFO][4694] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" iface="eth0" netns="/var/run/netns/cni-68bf87c7-9db4-963d-98d4-3517dedacda8" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.491 [INFO][4694] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" iface="eth0" netns="/var/run/netns/cni-68bf87c7-9db4-963d-98d4-3517dedacda8" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.491 [INFO][4694] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.491 [INFO][4694] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.533 [INFO][4712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.533 [INFO][4712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.533 [INFO][4712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.540 [WARNING][4712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.541 [INFO][4712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.547 [INFO][4712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:05.549956 env[1437]: 2025-09-13 00:53:05.548 [INFO][4694] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:05.555522 env[1437]: time="2025-09-13T00:53:05.553795963Z" level=info msg="TearDown network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" successfully" Sep 13 00:53:05.555522 env[1437]: time="2025-09-13T00:53:05.553837563Z" level=info msg="StopPodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" returns successfully" Sep 13 00:53:05.553655 systemd[1]: run-netns-cni\x2d68bf87c7\x2d9db4\x2d963d\x2d98d4\x2d3517dedacda8.mount: Deactivated successfully. Sep 13 00:53:05.555854 env[1437]: time="2025-09-13T00:53:05.555824787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c8cdd7b4d-lhq6x,Uid:99aa3f02-288f-4ef2-b42b-e4dc75fa0859,Namespace:calico-system,Attempt:1,}" Sep 13 00:53:05.574723 kubelet[2440]: I0913 00:53:05.574695 2440 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:05.625744 systemd[1]: run-containerd-runc-k8s.io-104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647-runc.MmvfYq.mount: Deactivated successfully. Sep 13 00:53:05.857964 systemd-networkd[1595]: cali4ce46119407: Link UP Sep 13 00:53:05.861470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:05.869111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4ce46119407: link becomes ready Sep 13 00:53:05.872971 systemd-networkd[1595]: cali4ce46119407: Gained carrier Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.681 [INFO][4732] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0 calico-kube-controllers-7c8cdd7b4d- calico-system 99aa3f02-288f-4ef2-b42b-e4dc75fa0859 1032 0 2025-09-13 00:52:36 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7c8cdd7b4d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f calico-kube-controllers-7c8cdd7b4d-lhq6x eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4ce46119407 [] [] }} ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.681 [INFO][4732] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.769 [INFO][4763] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" HandleID="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.770 [INFO][4763] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" HandleID="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003328d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"calico-kube-controllers-7c8cdd7b4d-lhq6x", "timestamp":"2025-09-13 00:53:05.767673514 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.770 [INFO][4763] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.770 [INFO][4763] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.771 [INFO][4763] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.786 [INFO][4763] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.794 [INFO][4763] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.806 [INFO][4763] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.808 [INFO][4763] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.810 [INFO][4763] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.810 [INFO][4763] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.812 [INFO][4763] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.817 [INFO][4763] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.832 [INFO][4763] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.200/26] block=192.168.110.192/26 handle="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.832 [INFO][4763] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.200/26] handle="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.832 [INFO][4763] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:05.927298 env[1437]: 2025-09-13 00:53:05.832 [INFO][4763] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.200/26] IPv6=[] ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" HandleID="k8s-pod-network.97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.928302 env[1437]: 2025-09-13 00:53:05.847 [INFO][4732] cni-plugin/k8s.go 418: Populated endpoint ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0", GenerateName:"calico-kube-controllers-7c8cdd7b4d-", Namespace:"calico-system", SelfLink:"", UID:"99aa3f02-288f-4ef2-b42b-e4dc75fa0859", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c8cdd7b4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"calico-kube-controllers-7c8cdd7b4d-lhq6x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4ce46119407", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:05.928302 env[1437]: 2025-09-13 00:53:05.848 [INFO][4732] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.200/32] ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.928302 env[1437]: 2025-09-13 00:53:05.848 [INFO][4732] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4ce46119407 ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.928302 env[1437]: 2025-09-13 00:53:05.873 [INFO][4732] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.928302 env[1437]: 2025-09-13 00:53:05.874 [INFO][4732] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0", GenerateName:"calico-kube-controllers-7c8cdd7b4d-", Namespace:"calico-system", SelfLink:"", UID:"99aa3f02-288f-4ef2-b42b-e4dc75fa0859", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c8cdd7b4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d", Pod:"calico-kube-controllers-7c8cdd7b4d-lhq6x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4ce46119407", MAC:"62:a3:b6:26:c3:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:05.928302 env[1437]: 2025-09-13 00:53:05.925 [INFO][4732] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d" Namespace="calico-system" Pod="calico-kube-controllers-7c8cdd7b4d-lhq6x" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:05.980358 env[1437]: time="2025-09-13T00:53:05.980290150Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:05.980542 env[1437]: time="2025-09-13T00:53:05.980520953Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:05.980633 env[1437]: time="2025-09-13T00:53:05.980615454Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:05.980834 env[1437]: time="2025-09-13T00:53:05.980812656Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d pid=4808 runtime=io.containerd.runc.v2 Sep 13 00:53:06.017905 systemd[1]: Started cri-containerd-97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d.scope. Sep 13 00:53:06.054919 systemd-networkd[1595]: cali405d9774e72: Link UP Sep 13 00:53:06.063209 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali405d9774e72: link becomes ready Sep 13 00:53:06.063390 systemd-networkd[1595]: cali405d9774e72: Gained carrier Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.796 [INFO][4754] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0 calico-apiserver-587c988db9- calico-apiserver c304ffe6-0c72-4c7f-9f26-bb176ec81915 1031 0 2025-09-13 00:52:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:587c988db9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f calico-apiserver-587c988db9-6tfqc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali405d9774e72 [] [] }} ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.796 [INFO][4754] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.881 [INFO][4774] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" HandleID="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.882 [INFO][4774] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" HandleID="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"calico-apiserver-587c988db9-6tfqc", "timestamp":"2025-09-13 00:53:05.881957277 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.882 [INFO][4774] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.882 [INFO][4774] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.882 [INFO][4774] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.917 [INFO][4774] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.939 [INFO][4774] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.952 [INFO][4774] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.966 [INFO][4774] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.979 [INFO][4774] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.979 [INFO][4774] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:05.991 [INFO][4774] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85 Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:06.010 [INFO][4774] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:06.050 [INFO][4774] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.201/26] block=192.168.110.192/26 handle="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:06.050 [INFO][4774] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.201/26] handle="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:06.050 [INFO][4774] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:06.120673 env[1437]: 2025-09-13 00:53:06.050 [INFO][4774] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.201/26] IPv6=[] ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" HandleID="k8s-pod-network.c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.123352 env[1437]: 2025-09-13 00:53:06.052 [INFO][4754] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0", GenerateName:"calico-apiserver-587c988db9-", Namespace:"calico-apiserver", SelfLink:"", UID:"c304ffe6-0c72-4c7f-9f26-bb176ec81915", ResourceVersion:"1031", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"587c988db9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"calico-apiserver-587c988db9-6tfqc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali405d9774e72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:06.123352 env[1437]: 2025-09-13 00:53:06.052 [INFO][4754] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.201/32] ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.123352 env[1437]: 2025-09-13 00:53:06.052 [INFO][4754] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali405d9774e72 ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.123352 env[1437]: 2025-09-13 00:53:06.064 [INFO][4754] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.123352 env[1437]: 2025-09-13 00:53:06.064 [INFO][4754] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0", GenerateName:"calico-apiserver-587c988db9-", Namespace:"calico-apiserver", SelfLink:"", UID:"c304ffe6-0c72-4c7f-9f26-bb176ec81915", ResourceVersion:"1031", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"587c988db9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85", Pod:"calico-apiserver-587c988db9-6tfqc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali405d9774e72", MAC:"0a:c6:a1:0b:37:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:06.123352 env[1437]: 2025-09-13 00:53:06.118 [INFO][4754] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-6tfqc" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:06.169029 env[1437]: time="2025-09-13T00:53:06.168954263Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:06.169251 env[1437]: time="2025-09-13T00:53:06.169224766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:06.169373 env[1437]: time="2025-09-13T00:53:06.169351668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:06.169618 env[1437]: time="2025-09-13T00:53:06.169578071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85 pid=4850 runtime=io.containerd.runc.v2 Sep 13 00:53:06.178927 systemd-networkd[1595]: calia8561f69b20: Gained IPv6LL Sep 13 00:53:06.204515 systemd[1]: Started cri-containerd-c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85.scope. Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.219000 audit: BPF prog-id=209 op=LOAD Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636461383163663161393831333130633336386230643837376232 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636461383163663161393831333130633336386230643837376232 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.221000 audit: BPF prog-id=210 op=LOAD Sep 13 00:53:06.221000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000287b90 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636461383163663161393831333130633336386230643837376232 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.222000 audit: BPF prog-id=211 op=LOAD Sep 13 00:53:06.222000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000287bd8 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636461383163663161393831333130633336386230643837376232 Sep 13 00:53:06.223000 audit: BPF prog-id=211 op=UNLOAD Sep 13 00:53:06.223000 audit: BPF prog-id=210 op=UNLOAD Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.223000 audit: BPF prog-id=212 op=LOAD Sep 13 00:53:06.223000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000287fe8 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636461383163663161393831333130633336386230643837376232 Sep 13 00:53:06.225000 audit[4874]: NETFILTER_CFG table=filter:120 family=2 entries=56 op=nft_register_chain pid=4874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:06.225000 audit[4874]: SYSCALL arch=c000003e syscall=46 success=yes exit=25500 a0=3 a1=7ffc6d136e70 a2=0 a3=7ffc6d136e5c items=0 ppid=3779 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.265000 audit: BPF prog-id=213 op=LOAD Sep 13 00:53:06.268000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.268000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4850 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336666534383237636435656264323864363431343637316466663233 Sep 13 00:53:06.268000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.268000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4850 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336666534383237636435656264323864363431343637316466663233 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit: BPF prog-id=214 op=LOAD Sep 13 00:53:06.269000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001dbbd0 items=0 ppid=4850 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336666534383237636435656264323864363431343637316466663233 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit: BPF prog-id=215 op=LOAD Sep 13 00:53:06.269000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001dbc18 items=0 ppid=4850 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336666534383237636435656264323864363431343637316466663233 Sep 13 00:53:06.269000 audit: BPF prog-id=215 op=UNLOAD Sep 13 00:53:06.269000 audit: BPF prog-id=214 op=UNLOAD Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.269000 audit: BPF prog-id=216 op=LOAD Sep 13 00:53:06.269000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000380028 items=0 ppid=4850 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336666534383237636435656264323864363431343637316466663233 Sep 13 00:53:06.405000 audit[4885]: NETFILTER_CFG table=filter:121 family=2 entries=67 op=nft_register_chain pid=4885 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:06.405000 audit[4885]: SYSCALL arch=c000003e syscall=46 success=yes exit=31852 a0=3 a1=7ffc7af036e0 a2=0 a3=7ffc7af036cc items=0 ppid=3779 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.405000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:06.452302 env[1437]: time="2025-09-13T00:53:06.452251580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-587c988db9-6tfqc,Uid:c304ffe6-0c72-4c7f-9f26-bb176ec81915,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85\"" Sep 13 00:53:06.485471 env[1437]: time="2025-09-13T00:53:06.485428469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c8cdd7b4d-lhq6x,Uid:99aa3f02-288f-4ef2-b42b-e4dc75fa0859,Namespace:calico-system,Attempt:1,} returns sandbox id \"97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d\"" Sep 13 00:53:07.264311 systemd-networkd[1595]: cali4ce46119407: Gained IPv6LL Sep 13 00:53:07.335383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1242094628.mount: Deactivated successfully. Sep 13 00:53:07.968322 systemd-networkd[1595]: cali405d9774e72: Gained IPv6LL Sep 13 00:53:08.623340 env[1437]: time="2025-09-13T00:53:08.623296224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.628421 env[1437]: time="2025-09-13T00:53:08.628378882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.633015 env[1437]: time="2025-09-13T00:53:08.632839632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.649800 env[1437]: time="2025-09-13T00:53:08.649757323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.650197 env[1437]: time="2025-09-13T00:53:08.650157928Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 13 00:53:08.652538 env[1437]: time="2025-09-13T00:53:08.652502154Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:53:08.653356 env[1437]: time="2025-09-13T00:53:08.653320763Z" level=info msg="CreateContainer within sandbox \"10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 13 00:53:08.687176 env[1437]: time="2025-09-13T00:53:08.687136145Z" level=info msg="CreateContainer within sandbox \"10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65\"" Sep 13 00:53:08.687815 env[1437]: time="2025-09-13T00:53:08.687783452Z" level=info msg="StartContainer for \"592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65\"" Sep 13 00:53:08.722342 systemd[1]: Started cri-containerd-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65.scope. Sep 13 00:53:08.736837 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.bzPFZq.mount: Deactivated successfully. Sep 13 00:53:08.779986 kernel: kauditd_printk_skb: 665 callbacks suppressed Sep 13 00:53:08.780073 kernel: audit: type=1400 audit(1757724788.772:1369): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.804566 kernel: audit: type=1400 audit(1757724788.772:1370): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.821124 kernel: audit: type=1400 audit(1757724788.772:1371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.835174 kernel: audit: type=1400 audit(1757724788.772:1372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.849234 kernel: audit: type=1400 audit(1757724788.772:1373): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.864106 kernel: audit: type=1400 audit(1757724788.772:1374): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.891310 kernel: audit: type=1400 audit(1757724788.772:1375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.891397 kernel: audit: type=1400 audit(1757724788.772:1376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.904872 kernel: audit: type=1400 audit(1757724788.772:1377): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.917708 kernel: audit: type=1400 audit(1757724788.772:1378): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.772000 audit: BPF prog-id=217 op=LOAD Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4091 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539323930323934376431353630613331613738346433393132643664 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4091 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539323930323934376431353630613331613738346433393132643664 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.777000 audit: BPF prog-id=218 op=LOAD Sep 13 00:53:08.777000 audit[4906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000354350 items=0 ppid=4091 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539323930323934376431353630613331613738346433393132643664 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit: BPF prog-id=219 op=LOAD Sep 13 00:53:08.791000 audit[4906]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000354398 items=0 ppid=4091 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539323930323934376431353630613331613738346433393132643664 Sep 13 00:53:08.791000 audit: BPF prog-id=219 op=UNLOAD Sep 13 00:53:08.791000 audit: BPF prog-id=218 op=UNLOAD Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.791000 audit: BPF prog-id=220 op=LOAD Sep 13 00:53:08.791000 audit[4906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003547a8 items=0 ppid=4091 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539323930323934376431353630613331613738346433393132643664 Sep 13 00:53:08.956288 env[1437]: time="2025-09-13T00:53:08.956244983Z" level=info msg="StartContainer for \"592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65\" returns successfully" Sep 13 00:53:09.745597 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.wSGwcy.mount: Deactivated successfully. Sep 13 00:53:09.780000 audit[4950]: NETFILTER_CFG table=filter:122 family=2 entries=12 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:09.780000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc995c800 a2=0 a3=7fffc995c7ec items=0 ppid=2544 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:09.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:09.784000 audit[4950]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:09.784000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc995c800 a2=0 a3=7fffc995c7ec items=0 ppid=2544 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:09.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:10.788937 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.DrGJYz.mount: Deactivated successfully. Sep 13 00:53:10.930743 env[1437]: time="2025-09-13T00:53:10.930701205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:10.936156 env[1437]: time="2025-09-13T00:53:10.936123664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:10.939483 env[1437]: time="2025-09-13T00:53:10.939456600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:10.942776 env[1437]: time="2025-09-13T00:53:10.942746736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:10.943238 env[1437]: time="2025-09-13T00:53:10.943209841Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:53:10.945597 env[1437]: time="2025-09-13T00:53:10.945568467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:53:10.946484 env[1437]: time="2025-09-13T00:53:10.946457777Z" level=info msg="CreateContainer within sandbox \"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:53:10.989711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1597534877.mount: Deactivated successfully. Sep 13 00:53:10.997576 env[1437]: time="2025-09-13T00:53:10.997525033Z" level=info msg="CreateContainer within sandbox \"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6c6e1c16ea5a17c1f6feeb322d2934a7af50b9c5caa7429eed8e45c58e496c2c\"" Sep 13 00:53:10.998503 env[1437]: time="2025-09-13T00:53:10.998473543Z" level=info msg="StartContainer for \"6c6e1c16ea5a17c1f6feeb322d2934a7af50b9c5caa7429eed8e45c58e496c2c\"" Sep 13 00:53:11.020423 systemd[1]: Started cri-containerd-6c6e1c16ea5a17c1f6feeb322d2934a7af50b9c5caa7429eed8e45c58e496c2c.scope. Sep 13 00:53:11.081000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.081000 audit[4985]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff6f024d2e8 items=0 ppid=4275 pid=4985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:11.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663366531633136656135613137633166366665656233323264323933 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit: BPF prog-id=221 op=LOAD Sep 13 00:53:11.082000 audit[4985]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039a248 items=0 ppid=4275 pid=4985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:11.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663366531633136656135613137633166366665656233323264323933 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit: BPF prog-id=222 op=LOAD Sep 13 00:53:11.082000 audit[4985]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039a298 items=0 ppid=4275 pid=4985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:11.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663366531633136656135613137633166366665656233323264323933 Sep 13 00:53:11.082000 audit: BPF prog-id=222 op=UNLOAD Sep 13 00:53:11.082000 audit: BPF prog-id=221 op=UNLOAD Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { perfmon } for pid=4985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit[4985]: AVC avc: denied { bpf } for pid=4985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:11.082000 audit: BPF prog-id=223 op=LOAD Sep 13 00:53:11.082000 audit[4985]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039a328 items=0 ppid=4275 pid=4985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:11.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663366531633136656135613137633166366665656233323264323933 Sep 13 00:53:11.105604 env[1437]: time="2025-09-13T00:53:11.105041185Z" level=info msg="StartContainer for \"6c6e1c16ea5a17c1f6feeb322d2934a7af50b9c5caa7429eed8e45c58e496c2c\" returns successfully" Sep 13 00:53:13.290000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.290000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.290000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001942660 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:13.290000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:13.290000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a76b70 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:13.290000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:13.591000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.591000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00807ea80 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:53:13.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:13.592000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7411 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.592000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c006c70db0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:53:13.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:13.592000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.592000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c006c70de0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:53:13.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:13.614000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.614000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0061545a0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:53:13.614000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:13.615000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7417 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.615000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0061546c0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:53:13.615000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:13.615000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:13.615000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c006385120 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:53:13.615000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:16.369841 env[1437]: time="2025-09-13T00:53:16.369794476Z" level=info msg="StopPodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\"" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.453 [WARNING][5023] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"33589be7-c965-4ffc-b1b2-2833caab0cce", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b", Pod:"coredns-7c65d6cfc9-vnvl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0467fbd5d6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.453 [INFO][5023] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.453 [INFO][5023] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" iface="eth0" netns="" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.453 [INFO][5023] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.453 [INFO][5023] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.508 [INFO][5033] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.509 [INFO][5033] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.509 [INFO][5033] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.534 [WARNING][5033] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.534 [INFO][5033] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.536 [INFO][5033] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:16.538793 env[1437]: 2025-09-13 00:53:16.537 [INFO][5023] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.539594 env[1437]: time="2025-09-13T00:53:16.539547849Z" level=info msg="TearDown network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" successfully" Sep 13 00:53:16.539680 env[1437]: time="2025-09-13T00:53:16.539663450Z" level=info msg="StopPodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" returns successfully" Sep 13 00:53:16.540372 env[1437]: time="2025-09-13T00:53:16.540345957Z" level=info msg="RemovePodSandbox for \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\"" Sep 13 00:53:16.540625 env[1437]: time="2025-09-13T00:53:16.540580559Z" level=info msg="Forcibly stopping sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\"" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.610 [WARNING][5049] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"33589be7-c965-4ffc-b1b2-2833caab0cce", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"a9f1f519822adecc2234702f33b440d944247bae4f5814b3dbd16f32d02af37b", Pod:"coredns-7c65d6cfc9-vnvl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0467fbd5d6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.610 [INFO][5049] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.610 [INFO][5049] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" iface="eth0" netns="" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.611 [INFO][5049] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.611 [INFO][5049] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.648 [INFO][5056] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.649 [INFO][5056] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.649 [INFO][5056] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.654 [WARNING][5056] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.654 [INFO][5056] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" HandleID="k8s-pod-network.885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--vnvl5-eth0" Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.655 [INFO][5056] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:16.660708 env[1437]: 2025-09-13 00:53:16.659 [INFO][5049] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd" Sep 13 00:53:16.660708 env[1437]: time="2025-09-13T00:53:16.660680543Z" level=info msg="TearDown network for sandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" successfully" Sep 13 00:53:17.439141 env[1437]: time="2025-09-13T00:53:17.439080144Z" level=info msg="RemovePodSandbox \"885f443863f4d1cf8d03a657bd9b6bafcd0cf18c6257e4fe398480a78275d7fd\" returns successfully" Sep 13 00:53:17.439821 env[1437]: time="2025-09-13T00:53:17.439792051Z" level=info msg="StopPodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\"" Sep 13 00:53:17.464958 env[1437]: time="2025-09-13T00:53:17.464919295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.470063 env[1437]: time="2025-09-13T00:53:17.470024844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.473625 env[1437]: time="2025-09-13T00:53:17.473583479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.479821 env[1437]: time="2025-09-13T00:53:17.477917621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.479821 env[1437]: time="2025-09-13T00:53:17.478269024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:53:17.485118 env[1437]: time="2025-09-13T00:53:17.484779787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:53:17.486425 env[1437]: time="2025-09-13T00:53:17.486390903Z" level=info msg="CreateContainer within sandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:53:17.529584 kernel: kauditd_printk_skb: 120 callbacks suppressed Sep 13 00:53:17.529706 kernel: audit: type=1400 audit(1757724797.504:1403): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.504000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.522557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2616527030.mount: Deactivated successfully. Sep 13 00:53:17.556228 kernel: audit: type=1300 audit(1757724797.504:1403): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001942920 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.504000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001942920 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.576109 kernel: audit: type=1327 audit(1757724797.504:1403): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.504000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.585703 env[1437]: time="2025-09-13T00:53:17.585667866Z" level=info msg="CreateContainer within sandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\"" Sep 13 00:53:17.587572 env[1437]: time="2025-09-13T00:53:17.586872977Z" level=info msg="StartContainer for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\"" Sep 13 00:53:17.596140 kernel: audit: type=1400 audit(1757724797.504:1404): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.504000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001942940 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.492 [WARNING][5071] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0", GenerateName:"calico-kube-controllers-7c8cdd7b4d-", Namespace:"calico-system", SelfLink:"", UID:"99aa3f02-288f-4ef2-b42b-e4dc75fa0859", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c8cdd7b4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d", Pod:"calico-kube-controllers-7c8cdd7b4d-lhq6x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4ce46119407", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.492 [INFO][5071] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.492 [INFO][5071] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" iface="eth0" netns="" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.492 [INFO][5071] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.492 [INFO][5071] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.546 [INFO][5078] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.546 [INFO][5078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.546 [INFO][5078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.559 [WARNING][5078] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.559 [INFO][5078] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.580 [INFO][5078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:17.617703 env[1437]: 2025-09-13 00:53:17.582 [INFO][5071] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.618457 env[1437]: time="2025-09-13T00:53:17.618418983Z" level=info msg="TearDown network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" successfully" Sep 13 00:53:17.618542 env[1437]: time="2025-09-13T00:53:17.618529284Z" level=info msg="StopPodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" returns successfully" Sep 13 00:53:17.619051 env[1437]: time="2025-09-13T00:53:17.619030889Z" level=info msg="RemovePodSandbox for \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\"" Sep 13 00:53:17.619692 env[1437]: time="2025-09-13T00:53:17.619643895Z" level=info msg="Forcibly stopping sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\"" Sep 13 00:53:17.642181 kernel: audit: type=1300 audit(1757724797.504:1404): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001942940 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.643762 systemd[1]: Started cri-containerd-c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f.scope. Sep 13 00:53:17.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.666133 kernel: audit: type=1327 audit(1757724797.504:1404): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.504000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.689250 kernel: audit: type=1400 audit(1757724797.504:1405): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.504000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019429a0 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.720151 kernel: audit: type=1300 audit(1757724797.504:1405): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019429a0 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.742106 kernel: audit: type=1327 audit(1757724797.504:1405): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.504000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.762183 kernel: audit: type=1400 audit(1757724797.504:1406): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:17.504000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0020ec680 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:53:17.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.740000 audit: BPF prog-id=224 op=LOAD Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4452 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334323430313061646538343563666365353864623630643535666632 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4452 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334323430313061646538343563666365353864623630643535666632 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.744000 audit: BPF prog-id=225 op=LOAD Sep 13 00:53:17.744000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025e20 items=0 ppid=4452 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334323430313061646538343563666365353864623630643535666632 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.767000 audit: BPF prog-id=226 op=LOAD Sep 13 00:53:17.767000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025e68 items=0 ppid=4452 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334323430313061646538343563666365353864623630643535666632 Sep 13 00:53:17.767000 audit: BPF prog-id=226 op=UNLOAD Sep 13 00:53:17.767000 audit: BPF prog-id=225 op=UNLOAD Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:17.768000 audit: BPF prog-id=227 op=LOAD Sep 13 00:53:17.768000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ec278 items=0 ppid=4452 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334323430313061646538343563666365353864623630643535666632 Sep 13 00:53:17.819239 env[1437]: time="2025-09-13T00:53:17.819194430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.827807 env[1437]: time="2025-09-13T00:53:17.827764813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.835236 env[1437]: time="2025-09-13T00:53:17.835198685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.835771 env[1437]: time="2025-09-13T00:53:17.835734891Z" level=info msg="StartContainer for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" returns successfully" Sep 13 00:53:17.838734 env[1437]: time="2025-09-13T00:53:17.838699319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:17.840225 env[1437]: time="2025-09-13T00:53:17.839534827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:53:17.841640 env[1437]: time="2025-09-13T00:53:17.841609848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:53:17.842540 env[1437]: time="2025-09-13T00:53:17.842508356Z" level=info msg="CreateContainer within sandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.744 [WARNING][5117] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0", GenerateName:"calico-kube-controllers-7c8cdd7b4d-", Namespace:"calico-system", SelfLink:"", UID:"99aa3f02-288f-4ef2-b42b-e4dc75fa0859", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c8cdd7b4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d", Pod:"calico-kube-controllers-7c8cdd7b4d-lhq6x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4ce46119407", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.744 [INFO][5117] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.744 [INFO][5117] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" iface="eth0" netns="" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.744 [INFO][5117] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.744 [INFO][5117] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.817 [INFO][5125] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.817 [INFO][5125] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.817 [INFO][5125] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.847 [WARNING][5125] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.847 [INFO][5125] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" HandleID="k8s-pod-network.6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--kube--controllers--7c8cdd7b4d--lhq6x-eth0" Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.850 [INFO][5125] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:17.861227 env[1437]: 2025-09-13 00:53:17.856 [INFO][5117] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845" Sep 13 00:53:17.861868 env[1437]: time="2025-09-13T00:53:17.861261238Z" level=info msg="TearDown network for sandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" successfully" Sep 13 00:53:17.886390 env[1437]: time="2025-09-13T00:53:17.886342281Z" level=info msg="RemovePodSandbox \"6006e539de25a2bb4feca77a34a09a97c9fc6195b7a86a373425e879584c0845\" returns successfully" Sep 13 00:53:17.886825 env[1437]: time="2025-09-13T00:53:17.886794386Z" level=info msg="StopPodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\"" Sep 13 00:53:17.896665 env[1437]: time="2025-09-13T00:53:17.896628881Z" level=info msg="CreateContainer within sandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\"" Sep 13 00:53:17.897724 env[1437]: time="2025-09-13T00:53:17.897690091Z" level=info msg="StartContainer for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\"" Sep 13 00:53:17.929235 systemd[1]: Started cri-containerd-b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555.scope. Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:17.975 [WARNING][5151] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"b7b5e711-6cb4-4e5f-8005-a125a1a6f508", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2", Pod:"goldmane-7988f88666-hgphj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0ba98df1fbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:17.976 [INFO][5151] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:17.976 [INFO][5151] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" iface="eth0" netns="" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:17.976 [INFO][5151] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:17.976 [INFO][5151] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.031 [INFO][5172] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.031 [INFO][5172] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.032 [INFO][5172] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.040 [WARNING][5172] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.040 [INFO][5172] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.045 [INFO][5172] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:18.048569 env[1437]: 2025-09-13 00:53:18.046 [INFO][5151] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.049222 env[1437]: time="2025-09-13T00:53:18.048558047Z" level=info msg="TearDown network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" successfully" Sep 13 00:53:18.049222 env[1437]: time="2025-09-13T00:53:18.048594148Z" level=info msg="StopPodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" returns successfully" Sep 13 00:53:18.053021 env[1437]: time="2025-09-13T00:53:18.052991190Z" level=info msg="RemovePodSandbox for \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\"" Sep 13 00:53:18.053682 env[1437]: time="2025-09-13T00:53:18.053635196Z" level=info msg="Forcibly stopping sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\"" Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.082000 audit: BPF prog-id=228 op=LOAD Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4634 pid=5160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234663334353439323165333432323630306664626136313735326366 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4634 pid=5160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234663334353439323165333432323630306664626136313735326366 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.083000 audit: BPF prog-id=229 op=LOAD Sep 13 00:53:18.083000 audit[5160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000363020 items=0 ppid=4634 pid=5160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234663334353439323165333432323630306664626136313735326366 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.084000 audit: BPF prog-id=230 op=LOAD Sep 13 00:53:18.084000 audit[5160]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000363068 items=0 ppid=4634 pid=5160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234663334353439323165333432323630306664626136313735326366 Sep 13 00:53:18.085000 audit: BPF prog-id=230 op=UNLOAD Sep 13 00:53:18.085000 audit: BPF prog-id=229 op=UNLOAD Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { perfmon } for pid=5160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit[5160]: AVC avc: denied { bpf } for pid=5160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.085000 audit: BPF prog-id=231 op=LOAD Sep 13 00:53:18.085000 audit[5160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000363478 items=0 ppid=4634 pid=5160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234663334353439323165333432323630306664626136313735326366 Sep 13 00:53:18.160430 env[1437]: time="2025-09-13T00:53:18.160379315Z" level=info msg="StartContainer for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" returns successfully" Sep 13 00:53:18.183693 env[1437]: time="2025-09-13T00:53:18.183647437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.192760 env[1437]: time="2025-09-13T00:53:18.192721824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.196634 env[1437]: time="2025-09-13T00:53:18.196597461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.119 [WARNING][5194] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"b7b5e711-6cb4-4e5f-8005-a125a1a6f508", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"10a90b64bec30e64b2579d427f0b8213402b98a4ccb4479d10251470aeff43f2", Pod:"goldmane-7988f88666-hgphj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0ba98df1fbb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.119 [INFO][5194] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.119 [INFO][5194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" iface="eth0" netns="" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.119 [INFO][5194] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.119 [INFO][5194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.182 [INFO][5201] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.184 [INFO][5201] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.184 [INFO][5201] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.191 [WARNING][5201] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.191 [INFO][5201] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" HandleID="k8s-pod-network.83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Workload="ci--3510.3.8--n--93bff2e88f-k8s-goldmane--7988f88666--hgphj-eth0" Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.194 [INFO][5201] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:18.197393 env[1437]: 2025-09-13 00:53:18.195 [INFO][5194] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d" Sep 13 00:53:18.197933 env[1437]: time="2025-09-13T00:53:18.197420969Z" level=info msg="TearDown network for sandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" successfully" Sep 13 00:53:18.200647 env[1437]: time="2025-09-13T00:53:18.200608199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.201110 env[1437]: time="2025-09-13T00:53:18.201068403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:53:18.203056 env[1437]: time="2025-09-13T00:53:18.203032322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 13 00:53:18.204219 env[1437]: time="2025-09-13T00:53:18.204193233Z" level=info msg="CreateContainer within sandbox \"c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:53:18.206849 env[1437]: time="2025-09-13T00:53:18.206820958Z" level=info msg="RemovePodSandbox \"83b6c2a662af9c933995a0dab8b00253cc3b38e13a2139414030c8a12d5e419d\" returns successfully" Sep 13 00:53:18.207533 env[1437]: time="2025-09-13T00:53:18.207509865Z" level=info msg="StopPodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\"" Sep 13 00:53:18.232216 env[1437]: time="2025-09-13T00:53:18.232168600Z" level=info msg="CreateContainer within sandbox \"c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a412b6c587534063b1274e75d1aa0aab13e6b6d521bfd1a9f99596eec5f0bd47\"" Sep 13 00:53:18.233037 env[1437]: time="2025-09-13T00:53:18.233006208Z" level=info msg="StartContainer for \"a412b6c587534063b1274e75d1aa0aab13e6b6d521bfd1a9f99596eec5f0bd47\"" Sep 13 00:53:18.276485 systemd[1]: Started cri-containerd-a412b6c587534063b1274e75d1aa0aab13e6b6d521bfd1a9f99596eec5f0bd47.scope. Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.366000 audit: BPF prog-id=232 op=LOAD Sep 13 00:53:18.367000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.367000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4850 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313262366335383735333430363362313237346537356431616130 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4850 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313262366335383735333430363362313237346537356431616130 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.368000 audit: BPF prog-id=233 op=LOAD Sep 13 00:53:18.368000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a9a30 items=0 ppid=4850 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313262366335383735333430363362313237346537356431616130 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.369000 audit: BPF prog-id=234 op=LOAD Sep 13 00:53:18.369000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a9a78 items=0 ppid=4850 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313262366335383735333430363362313237346537356431616130 Sep 13 00:53:18.369000 audit: BPF prog-id=234 op=UNLOAD Sep 13 00:53:18.370000 audit: BPF prog-id=233 op=UNLOAD Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.370000 audit: BPF prog-id=235 op=LOAD Sep 13 00:53:18.370000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a9e88 items=0 ppid=4850 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313262366335383735333430363362313237346537356431616130 Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.304 [WARNING][5225] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c53f02e-113d-486a-b30d-ba8be814dd68", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b", Pod:"calico-apiserver-8cb864958-qgdmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali204bab31a50", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.304 [INFO][5225] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.304 [INFO][5225] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" iface="eth0" netns="" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.304 [INFO][5225] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.304 [INFO][5225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.344 [INFO][5249] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.344 [INFO][5249] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.344 [INFO][5249] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.360 [WARNING][5249] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.360 [INFO][5249] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.372 [INFO][5249] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:18.380651 env[1437]: 2025-09-13 00:53:18.377 [INFO][5225] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.381371 env[1437]: time="2025-09-13T00:53:18.381327324Z" level=info msg="TearDown network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" successfully" Sep 13 00:53:18.381460 env[1437]: time="2025-09-13T00:53:18.381439625Z" level=info msg="StopPodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" returns successfully" Sep 13 00:53:18.382017 env[1437]: time="2025-09-13T00:53:18.381993031Z" level=info msg="RemovePodSandbox for \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\"" Sep 13 00:53:18.382278 env[1437]: time="2025-09-13T00:53:18.382230933Z" level=info msg="Forcibly stopping sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\"" Sep 13 00:53:18.475476 env[1437]: time="2025-09-13T00:53:18.475430023Z" level=info msg="StartContainer for \"a412b6c587534063b1274e75d1aa0aab13e6b6d521bfd1a9f99596eec5f0bd47\" returns successfully" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.453 [WARNING][5270] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c53f02e-113d-486a-b30d-ba8be814dd68", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b", Pod:"calico-apiserver-8cb864958-qgdmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali204bab31a50", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.453 [INFO][5270] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.453 [INFO][5270] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" iface="eth0" netns="" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.453 [INFO][5270] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.453 [INFO][5270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.531 [INFO][5282] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.532 [INFO][5282] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.532 [INFO][5282] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.548 [WARNING][5282] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.548 [INFO][5282] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" HandleID="k8s-pod-network.9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.562 [INFO][5282] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:18.565227 env[1437]: 2025-09-13 00:53:18.563 [INFO][5270] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448" Sep 13 00:53:18.565975 env[1437]: time="2025-09-13T00:53:18.565929387Z" level=info msg="TearDown network for sandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" successfully" Sep 13 00:53:18.575207 env[1437]: time="2025-09-13T00:53:18.575159775Z" level=info msg="RemovePodSandbox \"9787335008e30950e73c3c5b13c00c71591630d476c8c54230e2a0b76ee21448\" returns successfully" Sep 13 00:53:18.575838 env[1437]: time="2025-09-13T00:53:18.575812081Z" level=info msg="StopPodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\"" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.651 [WARNING][5306] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.651 [INFO][5306] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.651 [INFO][5306] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" iface="eth0" netns="" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.651 [INFO][5306] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.651 [INFO][5306] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.688 [INFO][5313] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.688 [INFO][5313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.688 [INFO][5313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.712 [WARNING][5313] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.712 [INFO][5313] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.714 [INFO][5313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:18.717415 env[1437]: 2025-09-13 00:53:18.715 [INFO][5306] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.718062 env[1437]: time="2025-09-13T00:53:18.718014439Z" level=info msg="TearDown network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" successfully" Sep 13 00:53:18.718169 env[1437]: time="2025-09-13T00:53:18.718148540Z" level=info msg="StopPodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" returns successfully" Sep 13 00:53:18.718742 env[1437]: time="2025-09-13T00:53:18.718713045Z" level=info msg="RemovePodSandbox for \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\"" Sep 13 00:53:18.718926 env[1437]: time="2025-09-13T00:53:18.718874547Z" level=info msg="Forcibly stopping sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\"" Sep 13 00:53:18.802497 kubelet[2440]: I0913 00:53:18.802234 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-7988f88666-hgphj" podStartSLOduration=37.57742067 podStartE2EDuration="43.802214643s" podCreationTimestamp="2025-09-13 00:52:35 +0000 UTC" firstStartedPulling="2025-09-13 00:53:02.426820771 +0000 UTC m=+46.165090653" lastFinishedPulling="2025-09-13 00:53:08.651614744 +0000 UTC m=+52.389884626" observedRunningTime="2025-09-13 00:53:09.749904492 +0000 UTC m=+53.488174474" watchObservedRunningTime="2025-09-13 00:53:18.802214643 +0000 UTC m=+62.540484625" Sep 13 00:53:18.862573 kubelet[2440]: I0913 00:53:18.861814 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-587c988db9-6tfqc" podStartSLOduration=34.113300794 podStartE2EDuration="45.861790311s" podCreationTimestamp="2025-09-13 00:52:33 +0000 UTC" firstStartedPulling="2025-09-13 00:53:06.453639796 +0000 UTC m=+50.191909778" lastFinishedPulling="2025-09-13 00:53:18.202129413 +0000 UTC m=+61.940399295" observedRunningTime="2025-09-13 00:53:18.80407146 +0000 UTC m=+62.542341342" watchObservedRunningTime="2025-09-13 00:53:18.861790311 +0000 UTC m=+62.600060193" Sep 13 00:53:18.884716 kubelet[2440]: I0913 00:53:18.884656 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8cb864958-qgdmr" podStartSLOduration=34.479895115 podStartE2EDuration="47.88463453s" podCreationTimestamp="2025-09-13 00:52:31 +0000 UTC" firstStartedPulling="2025-09-13 00:53:04.078915661 +0000 UTC m=+47.817185543" lastFinishedPulling="2025-09-13 00:53:17.483654976 +0000 UTC m=+61.221924958" observedRunningTime="2025-09-13 00:53:18.863379827 +0000 UTC m=+62.601649709" watchObservedRunningTime="2025-09-13 00:53:18.88463453 +0000 UTC m=+62.622904412" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.833 [WARNING][5327] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.833 [INFO][5327] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.833 [INFO][5327] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" iface="eth0" netns="" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.833 [INFO][5327] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.833 [INFO][5327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.871 [INFO][5334] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.873 [INFO][5334] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.873 [INFO][5334] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.890 [WARNING][5334] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.890 [INFO][5334] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" HandleID="k8s-pod-network.9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-whisker--84899dbc5--tpdxt-eth0" Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.894 [INFO][5334] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:18.897677 env[1437]: 2025-09-13 00:53:18.896 [INFO][5327] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b" Sep 13 00:53:18.898389 env[1437]: time="2025-09-13T00:53:18.898342160Z" level=info msg="TearDown network for sandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" successfully" Sep 13 00:53:18.908294 env[1437]: time="2025-09-13T00:53:18.908253255Z" level=info msg="RemovePodSandbox \"9b2d8003e9cce24904a5bf2ad897d71d16b0a395dff7769b7d7b4aaf099ae05b\" returns successfully" Sep 13 00:53:18.908927 env[1437]: time="2025-09-13T00:53:18.908899661Z" level=info msg="StopPodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\"" Sep 13 00:53:18.925000 audit[5361]: NETFILTER_CFG table=filter:124 family=2 entries=12 op=nft_register_rule pid=5361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:18.925000 audit[5361]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdb0f903c0 a2=0 a3=7ffdb0f903ac items=0 ppid=2544 pid=5361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:18.945000 audit[5361]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=5361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:18.945000 audit[5361]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb0f903c0 a2=0 a3=7ffdb0f903ac items=0 ppid=2544 pid=5361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:18.986000 audit[5376]: NETFILTER_CFG table=filter:126 family=2 entries=12 op=nft_register_rule pid=5376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:18.986000 audit[5376]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc29a08850 a2=0 a3=7ffc29a0883c items=0 ppid=2544 pid=5376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:18.998000 audit[5376]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:18.998000 audit[5376]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc29a08850 a2=0 a3=7ffc29a0883c items=0 ppid=2544 pid=5376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.008 [WARNING][5362] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4907e1ce-43d8-48b4-8598-39a3ca3ac943", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e", Pod:"csi-node-driver-w7jh7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali71e393380b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.008 [INFO][5362] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.008 [INFO][5362] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" iface="eth0" netns="" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.008 [INFO][5362] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.008 [INFO][5362] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.060 [INFO][5380] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.060 [INFO][5380] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.060 [INFO][5380] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.069 [WARNING][5380] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.069 [INFO][5380] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.072 [INFO][5380] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:19.075740 env[1437]: 2025-09-13 00:53:19.074 [INFO][5362] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.076501 env[1437]: time="2025-09-13T00:53:19.076458350Z" level=info msg="TearDown network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" successfully" Sep 13 00:53:19.076576 env[1437]: time="2025-09-13T00:53:19.076559951Z" level=info msg="StopPodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" returns successfully" Sep 13 00:53:19.077144 env[1437]: time="2025-09-13T00:53:19.077113256Z" level=info msg="RemovePodSandbox for \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\"" Sep 13 00:53:19.077236 env[1437]: time="2025-09-13T00:53:19.077153057Z" level=info msg="Forcibly stopping sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\"" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.180 [WARNING][5397] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4907e1ce-43d8-48b4-8598-39a3ca3ac943", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e", Pod:"csi-node-driver-w7jh7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali71e393380b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.180 [INFO][5397] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.180 [INFO][5397] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" iface="eth0" netns="" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.180 [INFO][5397] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.180 [INFO][5397] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.226 [INFO][5409] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.226 [INFO][5409] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.226 [INFO][5409] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.234 [WARNING][5409] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.234 [INFO][5409] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" HandleID="k8s-pod-network.62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Workload="ci--3510.3.8--n--93bff2e88f-k8s-csi--node--driver--w7jh7-eth0" Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.237 [INFO][5409] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:19.240364 env[1437]: 2025-09-13 00:53:19.238 [INFO][5397] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a" Sep 13 00:53:19.240983 env[1437]: time="2025-09-13T00:53:19.240394591Z" level=info msg="TearDown network for sandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" successfully" Sep 13 00:53:19.248304 env[1437]: time="2025-09-13T00:53:19.248210565Z" level=info msg="RemovePodSandbox \"62d5483c9901038441e52524f65372018d469315477f3ad0bd583dcafe8dc34a\" returns successfully" Sep 13 00:53:19.250032 env[1437]: time="2025-09-13T00:53:19.248650269Z" level=info msg="StopPodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\"" Sep 13 00:53:19.262869 kubelet[2440]: I0913 00:53:19.262805 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8cb864958-wj2gj" podStartSLOduration=35.479960111 podStartE2EDuration="48.262783602s" podCreationTimestamp="2025-09-13 00:52:31 +0000 UTC" firstStartedPulling="2025-09-13 00:53:05.05808045 +0000 UTC m=+48.796350332" lastFinishedPulling="2025-09-13 00:53:17.840903941 +0000 UTC m=+61.579173823" observedRunningTime="2025-09-13 00:53:18.888303565 +0000 UTC m=+62.626573547" watchObservedRunningTime="2025-09-13 00:53:19.262783602 +0000 UTC m=+63.001053484" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.368 [WARNING][5426] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0959e8f-3150-4ab5-b305-021720265406", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4", Pod:"calico-apiserver-8cb864958-wj2gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia8561f69b20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.369 [INFO][5426] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.369 [INFO][5426] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" iface="eth0" netns="" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.369 [INFO][5426] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.369 [INFO][5426] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.430 [INFO][5433] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.430 [INFO][5433] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.430 [INFO][5433] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.449 [WARNING][5433] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.449 [INFO][5433] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.451 [INFO][5433] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:19.456605 env[1437]: 2025-09-13 00:53:19.453 [INFO][5426] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.457398 env[1437]: time="2025-09-13T00:53:19.457358731Z" level=info msg="TearDown network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" successfully" Sep 13 00:53:19.457477 env[1437]: time="2025-09-13T00:53:19.457460532Z" level=info msg="StopPodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" returns successfully" Sep 13 00:53:19.457984 env[1437]: time="2025-09-13T00:53:19.457958637Z" level=info msg="RemovePodSandbox for \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\"" Sep 13 00:53:19.458153 env[1437]: time="2025-09-13T00:53:19.458111838Z" level=info msg="Forcibly stopping sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\"" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.561 [WARNING][5449] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0", GenerateName:"calico-apiserver-8cb864958-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0959e8f-3150-4ab5-b305-021720265406", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8cb864958", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4", Pod:"calico-apiserver-8cb864958-wj2gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia8561f69b20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.562 [INFO][5449] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.562 [INFO][5449] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" iface="eth0" netns="" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.562 [INFO][5449] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.562 [INFO][5449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.619 [INFO][5455] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.620 [INFO][5455] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.621 [INFO][5455] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.634 [WARNING][5455] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.634 [INFO][5455] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" HandleID="k8s-pod-network.0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.636 [INFO][5455] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:19.640568 env[1437]: 2025-09-13 00:53:19.638 [INFO][5449] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18" Sep 13 00:53:19.641438 env[1437]: time="2025-09-13T00:53:19.640608254Z" level=info msg="TearDown network for sandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" successfully" Sep 13 00:53:19.649932 env[1437]: time="2025-09-13T00:53:19.649871441Z" level=info msg="RemovePodSandbox \"0478c5ea7a5ba673d9ed0b11f2daee81109158c6147b61bfe1fc25110845be18\" returns successfully" Sep 13 00:53:19.650415 env[1437]: time="2025-09-13T00:53:19.650384546Z" level=info msg="StopPodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\"" Sep 13 00:53:19.808187 kubelet[2440]: I0913 00:53:19.804667 2440 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.773 [WARNING][5470] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0", GenerateName:"calico-apiserver-587c988db9-", Namespace:"calico-apiserver", SelfLink:"", UID:"c304ffe6-0c72-4c7f-9f26-bb176ec81915", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"587c988db9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85", Pod:"calico-apiserver-587c988db9-6tfqc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali405d9774e72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.773 [INFO][5470] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.773 [INFO][5470] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" iface="eth0" netns="" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.773 [INFO][5470] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.773 [INFO][5470] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.820 [INFO][5477] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.821 [INFO][5477] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.821 [INFO][5477] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.828 [WARNING][5477] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.828 [INFO][5477] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.832 [INFO][5477] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:19.838058 env[1437]: 2025-09-13 00:53:19.835 [INFO][5470] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.838665 env[1437]: time="2025-09-13T00:53:19.838108311Z" level=info msg="TearDown network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" successfully" Sep 13 00:53:19.838665 env[1437]: time="2025-09-13T00:53:19.838142211Z" level=info msg="StopPodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" returns successfully" Sep 13 00:53:19.838665 env[1437]: time="2025-09-13T00:53:19.838584815Z" level=info msg="RemovePodSandbox for \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\"" Sep 13 00:53:19.838665 env[1437]: time="2025-09-13T00:53:19.838616116Z" level=info msg="Forcibly stopping sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\"" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.908 [WARNING][5492] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0", GenerateName:"calico-apiserver-587c988db9-", Namespace:"calico-apiserver", SelfLink:"", UID:"c304ffe6-0c72-4c7f-9f26-bb176ec81915", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"587c988db9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"c6fe4827cd5ebd28d6414671dff23b0201f2eafb365e897af70fc742df58ac85", Pod:"calico-apiserver-587c988db9-6tfqc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali405d9774e72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.908 [INFO][5492] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.908 [INFO][5492] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" iface="eth0" netns="" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.909 [INFO][5492] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.909 [INFO][5492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.961 [INFO][5499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.961 [INFO][5499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.961 [INFO][5499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.970 [WARNING][5499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.970 [INFO][5499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" HandleID="k8s-pod-network.66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--6tfqc-eth0" Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.974 [INFO][5499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:19.991293 env[1437]: 2025-09-13 00:53:19.989 [INFO][5492] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab" Sep 13 00:53:19.995761 env[1437]: time="2025-09-13T00:53:19.991269651Z" level=info msg="TearDown network for sandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" successfully" Sep 13 00:53:20.002650 env[1437]: time="2025-09-13T00:53:20.002596257Z" level=info msg="RemovePodSandbox \"66cf41684c2ecadf9467ab0b684ee1d68ca376f6ed2519c53a86bd1c75ae77ab\" returns successfully" Sep 13 00:53:20.003150 env[1437]: time="2025-09-13T00:53:20.003099462Z" level=info msg="StopPodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\"" Sep 13 00:53:20.075000 audit[5524]: NETFILTER_CFG table=filter:128 family=2 entries=11 op=nft_register_rule pid=5524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:20.075000 audit[5524]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeafc38fa0 a2=0 a3=7ffeafc38f8c items=0 ppid=2544 pid=5524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:20.094000 audit[5524]: NETFILTER_CFG table=nat:129 family=2 entries=29 op=nft_register_chain pid=5524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:20.094000 audit[5524]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffeafc38fa0 a2=0 a3=7ffeafc38f8c items=0 ppid=2544 pid=5524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.115 [WARNING][5520] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b0dfb8da-d500-4982-a263-c9a621fcb5a2", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c", Pod:"coredns-7c65d6cfc9-khjw4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3dc150a46b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.116 [INFO][5520] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.116 [INFO][5520] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" iface="eth0" netns="" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.116 [INFO][5520] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.116 [INFO][5520] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.150 [INFO][5529] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.151 [INFO][5529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.151 [INFO][5529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.164 [WARNING][5529] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.164 [INFO][5529] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.166 [INFO][5529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:20.169789 env[1437]: 2025-09-13 00:53:20.168 [INFO][5520] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.170530 env[1437]: time="2025-09-13T00:53:20.169837506Z" level=info msg="TearDown network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" successfully" Sep 13 00:53:20.170530 env[1437]: time="2025-09-13T00:53:20.169876706Z" level=info msg="StopPodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" returns successfully" Sep 13 00:53:20.170530 env[1437]: time="2025-09-13T00:53:20.170367211Z" level=info msg="RemovePodSandbox for \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\"" Sep 13 00:53:20.170530 env[1437]: time="2025-09-13T00:53:20.170401411Z" level=info msg="Forcibly stopping sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\"" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.220 [WARNING][5544] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b0dfb8da-d500-4982-a263-c9a621fcb5a2", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"a789b9bcbdcfe887e594ea34e37f0346d0d0eab6af028d6dd51db999a9f8c42c", Pod:"coredns-7c65d6cfc9-khjw4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3dc150a46b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.221 [INFO][5544] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.221 [INFO][5544] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" iface="eth0" netns="" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.221 [INFO][5544] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.221 [INFO][5544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.260 [INFO][5551] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.260 [INFO][5551] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.260 [INFO][5551] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.267 [WARNING][5551] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.268 [INFO][5551] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" HandleID="k8s-pod-network.f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Workload="ci--3510.3.8--n--93bff2e88f-k8s-coredns--7c65d6cfc9--khjw4-eth0" Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.269 [INFO][5551] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:20.272579 env[1437]: 2025-09-13 00:53:20.270 [INFO][5544] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb" Sep 13 00:53:20.273191 env[1437]: time="2025-09-13T00:53:20.272562057Z" level=info msg="TearDown network for sandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" successfully" Sep 13 00:53:20.590776 env[1437]: time="2025-09-13T00:53:20.590671203Z" level=info msg="RemovePodSandbox \"f92e78f330d0af41014291f64d494569cab51bd9d010c794ee310b16704a2bbb\" returns successfully" Sep 13 00:53:22.486677 env[1437]: time="2025-09-13T00:53:22.486619593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:22.493173 env[1437]: time="2025-09-13T00:53:22.493135352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:22.496808 env[1437]: time="2025-09-13T00:53:22.496775785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:22.500801 env[1437]: time="2025-09-13T00:53:22.500767421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:22.501562 env[1437]: time="2025-09-13T00:53:22.501526827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 13 00:53:22.515719 env[1437]: time="2025-09-13T00:53:22.515679855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:53:22.530104 env[1437]: time="2025-09-13T00:53:22.529027975Z" level=info msg="CreateContainer within sandbox \"97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 13 00:53:22.561319 env[1437]: time="2025-09-13T00:53:22.561271965Z" level=info msg="CreateContainer within sandbox \"97cda81cf1a981310c368b0d877b2f8e984e610ff09e0b94e0b790213499567d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7\"" Sep 13 00:53:22.562146 env[1437]: time="2025-09-13T00:53:22.562116772Z" level=info msg="StartContainer for \"5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7\"" Sep 13 00:53:22.594255 systemd[1]: Started cri-containerd-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7.scope. Sep 13 00:53:22.645935 kernel: kauditd_printk_skb: 191 callbacks suppressed Sep 13 00:53:22.646069 kernel: audit: type=1400 audit(1757724802.625:1467): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.666761 kernel: audit: type=1400 audit(1757724802.625:1468): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.688187 kernel: audit: type=1400 audit(1757724802.625:1469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.707181 kernel: audit: type=1400 audit(1757724802.625:1470): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.727169 kernel: audit: type=1400 audit(1757724802.625:1471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.747823 kernel: audit: type=1400 audit(1757724802.625:1472): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.766206 kernel: audit: type=1400 audit(1757724802.625:1473): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.796968 kernel: audit: type=1400 audit(1757724802.625:1474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.797066 kernel: audit: type=1400 audit(1757724802.625:1475): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.814176 kernel: audit: type=1400 audit(1757724802.671:1476): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit: BPF prog-id=236 op=LOAD Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4808 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:22.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561316366323432353237623865363031336562396130643934346232 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4808 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:22.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561316366323432353237623865363031336562396130643934346232 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.671000 audit: BPF prog-id=237 op=LOAD Sep 13 00:53:22.671000 audit[5567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c3060 items=0 ppid=4808 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:22.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561316366323432353237623865363031336562396130643934346232 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.736000 audit: BPF prog-id=238 op=LOAD Sep 13 00:53:22.736000 audit[5567]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c30a8 items=0 ppid=4808 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:22.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561316366323432353237623865363031336562396130643934346232 Sep 13 00:53:22.791000 audit: BPF prog-id=238 op=UNLOAD Sep 13 00:53:22.791000 audit: BPF prog-id=237 op=UNLOAD Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:22.791000 audit: BPF prog-id=239 op=LOAD Sep 13 00:53:22.791000 audit[5567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c34b8 items=0 ppid=4808 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:22.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561316366323432353237623865363031336562396130643934346232 Sep 13 00:53:22.939601 env[1437]: time="2025-09-13T00:53:22.939556266Z" level=info msg="StartContainer for \"5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7\" returns successfully" Sep 13 00:53:23.840670 kubelet[2440]: I0913 00:53:23.840601 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7c8cdd7b4d-lhq6x" podStartSLOduration=31.826828233 podStartE2EDuration="47.84058336s" podCreationTimestamp="2025-09-13 00:52:36 +0000 UTC" firstStartedPulling="2025-09-13 00:53:06.489192513 +0000 UTC m=+50.227462395" lastFinishedPulling="2025-09-13 00:53:22.50294764 +0000 UTC m=+66.241217522" observedRunningTime="2025-09-13 00:53:23.838622943 +0000 UTC m=+67.576892825" watchObservedRunningTime="2025-09-13 00:53:23.84058336 +0000 UTC m=+67.578853242" Sep 13 00:53:23.923122 systemd[1]: run-containerd-runc-k8s.io-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7-runc.MAzcWp.mount: Deactivated successfully. Sep 13 00:53:24.326894 env[1437]: time="2025-09-13T00:53:24.326854529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:24.334569 env[1437]: time="2025-09-13T00:53:24.334535397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:24.339308 env[1437]: time="2025-09-13T00:53:24.339278038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:24.343867 env[1437]: time="2025-09-13T00:53:24.343836378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:24.344723 env[1437]: time="2025-09-13T00:53:24.344691985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:53:24.347462 env[1437]: time="2025-09-13T00:53:24.347432309Z" level=info msg="CreateContainer within sandbox \"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:53:24.453035 env[1437]: time="2025-09-13T00:53:24.452982432Z" level=info msg="CreateContainer within sandbox \"5f067c320d30f69c0aec39c6ddc4c85a8f744ba94e4d167a02cd6472f6310b8e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"694cdd40e1cb47800452549a0344e0443bc380843ada6ddde4b515aee647d336\"" Sep 13 00:53:24.453906 env[1437]: time="2025-09-13T00:53:24.453876040Z" level=info msg="StartContainer for \"694cdd40e1cb47800452549a0344e0443bc380843ada6ddde4b515aee647d336\"" Sep 13 00:53:24.486845 systemd[1]: Started cri-containerd-694cdd40e1cb47800452549a0344e0443bc380843ada6ddde4b515aee647d336.scope. Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fa8301e7488 items=0 ppid=4275 pid=5632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:24.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346364643430653163623437383030343532353439613033343465 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit: BPF prog-id=240 op=LOAD Sep 13 00:53:24.639000 audit[5632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c00025bd58 items=0 ppid=4275 pid=5632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:24.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346364643430653163623437383030343532353439613033343465 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit: BPF prog-id=241 op=LOAD Sep 13 00:53:24.639000 audit[5632]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c00025bda8 items=0 ppid=4275 pid=5632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:24.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346364643430653163623437383030343532353439613033343465 Sep 13 00:53:24.639000 audit: BPF prog-id=241 op=UNLOAD Sep 13 00:53:24.639000 audit: BPF prog-id=240 op=UNLOAD Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { perfmon } for pid=5632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit[5632]: AVC avc: denied { bpf } for pid=5632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:24.639000 audit: BPF prog-id=242 op=LOAD Sep 13 00:53:24.639000 audit[5632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c00025be38 items=0 ppid=4275 pid=5632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:24.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346364643430653163623437383030343532353439613033343465 Sep 13 00:53:24.668884 env[1437]: time="2025-09-13T00:53:24.668837918Z" level=info msg="StartContainer for \"694cdd40e1cb47800452549a0344e0443bc380843ada6ddde4b515aee647d336\" returns successfully" Sep 13 00:53:24.957935 kubelet[2440]: I0913 00:53:24.957849 2440 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:53:24.957935 kubelet[2440]: I0913 00:53:24.957883 2440 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:53:25.042000 audit[5177]: AVC avc: denied { watch } for pid=5177 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_48.1050697056/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c485 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c425,c485 tclass=file permissive=0 Sep 13 00:53:25.042000 audit[5177]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fa1340 a2=fc6 a3=0 items=0 ppid=4634 pid=5177 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c485 key=(null) Sep 13 00:53:25.042000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:53:25.107652 kubelet[2440]: I0913 00:53:25.107583 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-w7jh7" podStartSLOduration=27.780026483 podStartE2EDuration="49.107561239s" podCreationTimestamp="2025-09-13 00:52:36 +0000 UTC" firstStartedPulling="2025-09-13 00:53:03.018478141 +0000 UTC m=+46.756748023" lastFinishedPulling="2025-09-13 00:53:24.346012897 +0000 UTC m=+68.084282779" observedRunningTime="2025-09-13 00:53:24.843206142 +0000 UTC m=+68.581476124" watchObservedRunningTime="2025-09-13 00:53:25.107561239 +0000 UTC m=+68.845831121" Sep 13 00:53:25.185000 audit[5663]: NETFILTER_CFG table=filter:130 family=2 entries=9 op=nft_register_rule pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:25.185000 audit[5663]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffeb215fba0 a2=0 a3=7ffeb215fb8c items=0 ppid=2544 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:25.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:25.188000 audit[5663]: NETFILTER_CFG table=nat:131 family=2 entries=31 op=nft_register_chain pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:25.188000 audit[5663]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffeb215fba0 a2=0 a3=7ffeb215fb8c items=0 ppid=2544 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:25.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:26.804000 audit[5112]: AVC avc: denied { watch } for pid=5112 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_48.4092299403/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c28,c492 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c28,c492 tclass=file permissive=0 Sep 13 00:53:26.804000 audit[5112]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001065260 a2=fc6 a3=0 items=0 ppid=4452 pid=5112 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c28,c492 key=(null) Sep 13 00:53:26.804000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:53:26.971000 audit[5256]: AVC avc: denied { watch } for pid=5256 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_48.4267136563/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c335,c695 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c335,c695 tclass=file permissive=0 Sep 13 00:53:26.971000 audit[5256]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c19a40 a2=fc6 a3=0 items=0 ppid=4850 pid=5256 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c335,c695 key=(null) Sep 13 00:53:26.971000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:53:27.038182 kubelet[2440]: I0913 00:53:27.038149 2440 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:27.039498 env[1437]: time="2025-09-13T00:53:27.039170262Z" level=info msg="StopContainer for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" with timeout 30 (s)" Sep 13 00:53:27.040109 env[1437]: time="2025-09-13T00:53:27.039935968Z" level=info msg="Stop container \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" with signal terminated" Sep 13 00:53:27.072000 audit: BPF prog-id=224 op=UNLOAD Sep 13 00:53:27.073542 systemd[1]: cri-containerd-c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f.scope: Deactivated successfully. Sep 13 00:53:27.073835 systemd[1]: cri-containerd-c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f.scope: Consumed 1.556s CPU time. Sep 13 00:53:27.076000 audit: BPF prog-id=227 op=UNLOAD Sep 13 00:53:27.086867 systemd[1]: Created slice kubepods-besteffort-pod4f1cf792_0f30_42f9_bfc3_3d9d71b239b1.slice. Sep 13 00:53:27.097045 kubelet[2440]: I0913 00:53:27.097015 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4f1cf792-0f30-42f9-bfc3-3d9d71b239b1-calico-apiserver-certs\") pod \"calico-apiserver-587c988db9-hrmd8\" (UID: \"4f1cf792-0f30-42f9-bfc3-3d9d71b239b1\") " pod="calico-apiserver/calico-apiserver-587c988db9-hrmd8" Sep 13 00:53:27.097351 kubelet[2440]: I0913 00:53:27.097330 2440 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xpr8w\" (UniqueName: \"kubernetes.io/projected/4f1cf792-0f30-42f9-bfc3-3d9d71b239b1-kube-api-access-xpr8w\") pod \"calico-apiserver-587c988db9-hrmd8\" (UID: \"4f1cf792-0f30-42f9-bfc3-3d9d71b239b1\") " pod="calico-apiserver/calico-apiserver-587c988db9-hrmd8" Sep 13 00:53:27.115786 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f-rootfs.mount: Deactivated successfully. Sep 13 00:53:27.118000 audit[5674]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:27.118000 audit[5674]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff1f2f51e0 a2=0 a3=7fff1f2f51cc items=0 ppid=2544 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:27.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:27.136000 audit[5674]: NETFILTER_CFG table=nat:133 family=2 entries=38 op=nft_register_chain pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:27.136000 audit[5674]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7fff1f2f51e0 a2=0 a3=7fff1f2f51cc items=0 ppid=2544 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:27.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:27.161000 audit[5687]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:27.161000 audit[5687]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff1c1f6ab0 a2=0 a3=7fff1c1f6a9c items=0 ppid=2544 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:27.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:27.166000 audit[5687]: NETFILTER_CFG table=nat:135 family=2 entries=40 op=nft_register_rule pid=5687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:27.166000 audit[5687]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7fff1c1f6ab0 a2=0 a3=7fff1c1f6a9c items=0 ppid=2544 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:27.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:27.390306 env[1437]: time="2025-09-13T00:53:27.390259207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-587c988db9-hrmd8,Uid:4f1cf792-0f30-42f9-bfc3-3d9d71b239b1,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:53:29.361512 env[1437]: time="2025-09-13T00:53:29.361460957Z" level=info msg="shim disconnected" id=c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f Sep 13 00:53:29.362130 env[1437]: time="2025-09-13T00:53:29.362103962Z" level=warning msg="cleaning up after shim disconnected" id=c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f namespace=k8s.io Sep 13 00:53:29.362243 env[1437]: time="2025-09-13T00:53:29.362227663Z" level=info msg="cleaning up dead shim" Sep 13 00:53:29.372267 env[1437]: time="2025-09-13T00:53:29.372231145Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:53:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5691 runtime=io.containerd.runc.v2\n" Sep 13 00:53:29.379275 env[1437]: time="2025-09-13T00:53:29.379237302Z" level=info msg="StopContainer for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" returns successfully" Sep 13 00:53:29.381199 env[1437]: time="2025-09-13T00:53:29.381167618Z" level=info msg="StopPodSandbox for \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\"" Sep 13 00:53:29.381306 env[1437]: time="2025-09-13T00:53:29.381240719Z" level=info msg="Container to stop \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 13 00:53:29.386452 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b-shm.mount: Deactivated successfully. Sep 13 00:53:29.423771 kernel: kauditd_printk_skb: 119 callbacks suppressed Sep 13 00:53:29.423919 kernel: audit: type=1334 audit(1757724809.409:1502): prog-id=193 op=UNLOAD Sep 13 00:53:29.409000 audit: BPF prog-id=193 op=UNLOAD Sep 13 00:53:29.410148 systemd[1]: cri-containerd-8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b.scope: Deactivated successfully. Sep 13 00:53:29.422000 audit: BPF prog-id=196 op=UNLOAD Sep 13 00:53:29.439344 kernel: audit: type=1334 audit(1757724809.422:1503): prog-id=196 op=UNLOAD Sep 13 00:53:29.487074 env[1437]: time="2025-09-13T00:53:29.487021383Z" level=info msg="shim disconnected" id=8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b Sep 13 00:53:29.487237 env[1437]: time="2025-09-13T00:53:29.487079784Z" level=warning msg="cleaning up after shim disconnected" id=8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b namespace=k8s.io Sep 13 00:53:29.487237 env[1437]: time="2025-09-13T00:53:29.487111984Z" level=info msg="cleaning up dead shim" Sep 13 00:53:29.489217 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b-rootfs.mount: Deactivated successfully. Sep 13 00:53:29.499272 env[1437]: time="2025-09-13T00:53:29.499232583Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:53:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5732 runtime=io.containerd.runc.v2\n" Sep 13 00:53:29.637220 systemd-networkd[1595]: cali204bab31a50: Link DOWN Sep 13 00:53:29.637228 systemd-networkd[1595]: cali204bab31a50: Lost carrier Sep 13 00:53:29.700148 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic8c1a866828: link becomes ready Sep 13 00:53:29.704012 systemd-networkd[1595]: calic8c1a866828: Link UP Sep 13 00:53:29.704840 systemd-networkd[1595]: calic8c1a866828: Gained carrier Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.480 [INFO][5705] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0 calico-apiserver-587c988db9- calico-apiserver 4f1cf792-0f30-42f9-bfc3-3d9d71b239b1 1184 0 2025-09-13 00:53:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:587c988db9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-93bff2e88f calico-apiserver-587c988db9-hrmd8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic8c1a866828 [] [] }} ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.480 [INFO][5705] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.586 [INFO][5746] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" HandleID="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.586 [INFO][5746] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" HandleID="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-93bff2e88f", "pod":"calico-apiserver-587c988db9-hrmd8", "timestamp":"2025-09-13 00:53:29.58198756 +0000 UTC"}, Hostname:"ci-3510.3.8-n-93bff2e88f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.586 [INFO][5746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.586 [INFO][5746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.586 [INFO][5746] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-93bff2e88f' Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.602 [INFO][5746] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.637 [INFO][5746] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.651 [INFO][5746] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.663 [INFO][5746] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.666 [INFO][5746] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.666 [INFO][5746] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.668 [INFO][5746] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.673 [INFO][5746] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.688 [INFO][5746] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.110.202/26] block=192.168.110.192/26 handle="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.688 [INFO][5746] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.202/26] handle="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" host="ci-3510.3.8-n-93bff2e88f" Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.688 [INFO][5746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:29.730019 env[1437]: 2025-09-13 00:53:29.688 [INFO][5746] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.202/26] IPv6=[] ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" HandleID="k8s-pod-network.884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.730966 env[1437]: 2025-09-13 00:53:29.690 [INFO][5705] cni-plugin/k8s.go 418: Populated endpoint ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0", GenerateName:"calico-apiserver-587c988db9-", Namespace:"calico-apiserver", SelfLink:"", UID:"4f1cf792-0f30-42f9-bfc3-3d9d71b239b1", ResourceVersion:"1184", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"587c988db9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"", Pod:"calico-apiserver-587c988db9-hrmd8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.202/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic8c1a866828", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:29.730966 env[1437]: 2025-09-13 00:53:29.690 [INFO][5705] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.202/32] ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.730966 env[1437]: 2025-09-13 00:53:29.690 [INFO][5705] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic8c1a866828 ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.730966 env[1437]: 2025-09-13 00:53:29.700 [INFO][5705] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.730966 env[1437]: 2025-09-13 00:53:29.700 [INFO][5705] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0", GenerateName:"calico-apiserver-587c988db9-", Namespace:"calico-apiserver", SelfLink:"", UID:"4f1cf792-0f30-42f9-bfc3-3d9d71b239b1", ResourceVersion:"1184", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"587c988db9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-93bff2e88f", ContainerID:"884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec", Pod:"calico-apiserver-587c988db9-hrmd8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.202/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic8c1a866828", MAC:"9e:99:f9:99:bb:10", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:29.730966 env[1437]: 2025-09-13 00:53:29.728 [INFO][5705] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec" Namespace="calico-apiserver" Pod="calico-apiserver-587c988db9-hrmd8" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--587c988db9--hrmd8-eth0" Sep 13 00:53:29.767443 env[1437]: time="2025-09-13T00:53:29.767374775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:29.767660 env[1437]: time="2025-09-13T00:53:29.767635477Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:29.767759 env[1437]: time="2025-09-13T00:53:29.767734278Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:29.767990 env[1437]: time="2025-09-13T00:53:29.767953580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec pid=5792 runtime=io.containerd.runc.v2 Sep 13 00:53:29.794458 systemd[1]: Started cri-containerd-884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec.scope. Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.635 [INFO][5760] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.636 [INFO][5760] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" iface="eth0" netns="/var/run/netns/cni-baa7ccb2-0adb-cf50-c9f8-ba05804b7a43" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.636 [INFO][5760] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" iface="eth0" netns="/var/run/netns/cni-baa7ccb2-0adb-cf50-c9f8-ba05804b7a43" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.651 [INFO][5760] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" after=14.902321ms iface="eth0" netns="/var/run/netns/cni-baa7ccb2-0adb-cf50-c9f8-ba05804b7a43" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.651 [INFO][5760] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.651 [INFO][5760] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.734 [INFO][5771] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.734 [INFO][5771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.734 [INFO][5771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.820 [INFO][5771] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.820 [INFO][5771] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.822 [INFO][5771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:29.825787 env[1437]: 2025-09-13 00:53:29.824 [INFO][5760] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:53:29.826749 env[1437]: time="2025-09-13T00:53:29.826710260Z" level=info msg="TearDown network for sandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" successfully" Sep 13 00:53:29.826863 env[1437]: time="2025-09-13T00:53:29.826843261Z" level=info msg="StopPodSandbox for \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" returns successfully" Sep 13 00:53:29.841508 kubelet[2440]: I0913 00:53:29.841248 2440 scope.go:117] "RemoveContainer" containerID="c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f" Sep 13 00:53:29.855499 kernel: audit: type=1325 audit(1757724809.831:1504): table=filter:136 family=2 entries=55 op=nft_register_rule pid=5814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:29.831000 audit[5814]: NETFILTER_CFG table=filter:136 family=2 entries=55 op=nft_register_rule pid=5814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:29.857078 env[1437]: time="2025-09-13T00:53:29.857045408Z" level=info msg="RemoveContainer for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\"" Sep 13 00:53:29.831000 audit[5814]: SYSCALL arch=c000003e syscall=46 success=yes exit=8928 a0=3 a1=7ffed07da830 a2=0 a3=7ffed07da81c items=0 ppid=3779 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.885096 kernel: audit: type=1300 audit(1757724809.831:1504): arch=c000003e syscall=46 success=yes exit=8928 a0=3 a1=7ffed07da830 a2=0 a3=7ffed07da81c items=0 ppid=3779 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.831000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:29.904178 kernel: audit: type=1327 audit(1757724809.831:1504): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:29.906196 env[1437]: time="2025-09-13T00:53:29.906155609Z" level=info msg="RemoveContainer for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" returns successfully" Sep 13 00:53:29.906689 kubelet[2440]: I0913 00:53:29.906579 2440 scope.go:117] "RemoveContainer" containerID="c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f" Sep 13 00:53:29.907123 env[1437]: time="2025-09-13T00:53:29.906969616Z" level=error msg="ContainerStatus for \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\": not found" Sep 13 00:53:29.907436 kubelet[2440]: E0913 00:53:29.907355 2440 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\": not found" containerID="c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f" Sep 13 00:53:29.907436 kubelet[2440]: I0913 00:53:29.907392 2440 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f"} err="failed to get container status \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\": rpc error: code = NotFound desc = an error occurred when try to find container \"c424010ade845cfce58db60d55ff26b81c75ca6e929eebd6c179e03bbbf5f41f\": not found" Sep 13 00:53:29.840000 audit[5814]: NETFILTER_CFG table=filter:137 family=2 entries=2 op=nft_unregister_chain pid=5814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:29.924381 kernel: audit: type=1325 audit(1757724809.840:1505): table=filter:137 family=2 entries=2 op=nft_unregister_chain pid=5814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:29.840000 audit[5814]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffed07da830 a2=0 a3=5633f2f10000 items=0 ppid=3779 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.966362 kernel: audit: type=1300 audit(1757724809.840:1505): arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffed07da830 a2=0 a3=5633f2f10000 items=0 ppid=3779 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.966481 kernel: audit: type=1327 audit(1757724809.840:1505): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:29.840000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.984225 kernel: audit: type=1400 audit(1757724809.968:1506): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.002116 kernel: audit: type=1400 audit(1757724809.968:1507): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:29.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.010000 audit: BPF prog-id=243 op=LOAD Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=5792 pid=5802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346665396132376264376165373734363438313434356337366265 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=5792 pid=5802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346665396132376264376165373734363438313434356337366265 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.011000 audit: BPF prog-id=244 op=LOAD Sep 13 00:53:30.011000 audit[5802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000255cd0 items=0 ppid=5792 pid=5802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346665396132376264376165373734363438313434356337366265 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.012000 audit: BPF prog-id=245 op=LOAD Sep 13 00:53:30.012000 audit[5802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000255d18 items=0 ppid=5792 pid=5802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346665396132376264376165373734363438313434356337366265 Sep 13 00:53:30.013000 audit: BPF prog-id=245 op=UNLOAD Sep 13 00:53:30.013000 audit: BPF prog-id=244 op=UNLOAD Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { perfmon } for pid=5802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit[5802]: AVC avc: denied { bpf } for pid=5802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.013000 audit: BPF prog-id=246 op=LOAD Sep 13 00:53:30.013000 audit[5802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003da128 items=0 ppid=5792 pid=5802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346665396132376264376165373734363438313434356337366265 Sep 13 00:53:30.017000 audit[5825]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=5825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:30.017000 audit[5825]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffde5b9350 a2=0 a3=7fffde5b933c items=0 ppid=2544 pid=5825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:30.026550 kubelet[2440]: I0913 00:53:30.026520 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-htjn5\" (UniqueName: \"kubernetes.io/projected/7c53f02e-113d-486a-b30d-ba8be814dd68-kube-api-access-htjn5\") pod \"7c53f02e-113d-486a-b30d-ba8be814dd68\" (UID: \"7c53f02e-113d-486a-b30d-ba8be814dd68\") " Sep 13 00:53:30.026654 kubelet[2440]: I0913 00:53:30.026572 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7c53f02e-113d-486a-b30d-ba8be814dd68-calico-apiserver-certs\") pod \"7c53f02e-113d-486a-b30d-ba8be814dd68\" (UID: \"7c53f02e-113d-486a-b30d-ba8be814dd68\") " Sep 13 00:53:30.035239 kubelet[2440]: I0913 00:53:30.035207 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/7c53f02e-113d-486a-b30d-ba8be814dd68-kube-api-access-htjn5" (OuterVolumeSpecName: "kube-api-access-htjn5") pod "7c53f02e-113d-486a-b30d-ba8be814dd68" (UID: "7c53f02e-113d-486a-b30d-ba8be814dd68"). InnerVolumeSpecName "kube-api-access-htjn5". PluginName "kubernetes.io/projected", VolumeGidValue "" Sep 13 00:53:30.035344 kubelet[2440]: I0913 00:53:30.035205 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/7c53f02e-113d-486a-b30d-ba8be814dd68-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "7c53f02e-113d-486a-b30d-ba8be814dd68" (UID: "7c53f02e-113d-486a-b30d-ba8be814dd68"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Sep 13 00:53:30.034000 audit[5825]: NETFILTER_CFG table=nat:139 family=2 entries=40 op=nft_register_rule pid=5825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:30.034000 audit[5825]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7fffde5b9350 a2=0 a3=7fffde5b933c items=0 ppid=2544 pid=5825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:30.081605 env[1437]: time="2025-09-13T00:53:30.081559435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-587c988db9-hrmd8,Uid:4f1cf792-0f30-42f9-bfc3-3d9d71b239b1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec\"" Sep 13 00:53:30.086339 env[1437]: time="2025-09-13T00:53:30.086304773Z" level=info msg="CreateContainer within sandbox \"884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:53:30.101000 audit[5835]: NETFILTER_CFG table=filter:140 family=2 entries=57 op=nft_register_chain pid=5835 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:30.101000 audit[5835]: SYSCALL arch=c000003e syscall=46 success=yes exit=27796 a0=3 a1=7ffd77d5ae40 a2=0 a3=7ffd77d5ae2c items=0 ppid=3779 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.101000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:30.114375 env[1437]: time="2025-09-13T00:53:30.114329799Z" level=info msg="CreateContainer within sandbox \"884fe9a27bd7ae7746481445c76be3266dbb403b8b6474ea8610ecaf90c32eec\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cf364b682b89a115ef517070d236c171a9895e580bf31786ddd6d5423178e256\"" Sep 13 00:53:30.115217 env[1437]: time="2025-09-13T00:53:30.115187506Z" level=info msg="StartContainer for \"cf364b682b89a115ef517070d236c171a9895e580bf31786ddd6d5423178e256\"" Sep 13 00:53:30.127157 kubelet[2440]: I0913 00:53:30.127126 2440 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-htjn5\" (UniqueName: \"kubernetes.io/projected/7c53f02e-113d-486a-b30d-ba8be814dd68-kube-api-access-htjn5\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:53:30.127297 kubelet[2440]: I0913 00:53:30.127161 2440 reconciler_common.go:293] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7c53f02e-113d-486a-b30d-ba8be814dd68-calico-apiserver-certs\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:53:30.138400 systemd[1]: Started cri-containerd-cf364b682b89a115ef517070d236c171a9895e580bf31786ddd6d5423178e256.scope. Sep 13 00:53:30.147249 systemd[1]: Removed slice kubepods-besteffort-pod7c53f02e_113d_486a_b30d_ba8be814dd68.slice. Sep 13 00:53:30.147369 systemd[1]: kubepods-besteffort-pod7c53f02e_113d_486a_b30d_ba8be814dd68.slice: Consumed 1.594s CPU time. Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.178000 audit: BPF prog-id=247 op=LOAD Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5792 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366333634623638326238396131313565663531373037306432333663 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5792 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366333634623638326238396131313565663531373037306432333663 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit: BPF prog-id=248 op=LOAD Sep 13 00:53:30.181000 audit[5843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000398c20 items=0 ppid=5792 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366333634623638326238396131313565663531373037306432333663 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit: BPF prog-id=249 op=LOAD Sep 13 00:53:30.181000 audit[5843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000398c68 items=0 ppid=5792 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366333634623638326238396131313565663531373037306432333663 Sep 13 00:53:30.181000 audit: BPF prog-id=249 op=UNLOAD Sep 13 00:53:30.181000 audit: BPF prog-id=248 op=UNLOAD Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.181000 audit: BPF prog-id=250 op=LOAD Sep 13 00:53:30.181000 audit[5843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000399078 items=0 ppid=5792 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366333634623638326238396131313565663531373037306432333663 Sep 13 00:53:30.224555 env[1437]: time="2025-09-13T00:53:30.224506888Z" level=info msg="StartContainer for \"cf364b682b89a115ef517070d236c171a9895e580bf31786ddd6d5423178e256\" returns successfully" Sep 13 00:53:30.379643 systemd[1]: run-netns-cni\x2dbaa7ccb2\x2d0adb\x2dcf50\x2dc9f8\x2dba05804b7a43.mount: Deactivated successfully. Sep 13 00:53:30.379942 systemd[1]: var-lib-kubelet-pods-7c53f02e\x2d113d\x2d486a\x2db30d\x2dba8be814dd68-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dhtjn5.mount: Deactivated successfully. Sep 13 00:53:30.380120 systemd[1]: var-lib-kubelet-pods-7c53f02e\x2d113d\x2d486a\x2db30d\x2dba8be814dd68-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Sep 13 00:53:30.408230 kubelet[2440]: I0913 00:53:30.408186 2440 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="7c53f02e-113d-486a-b30d-ba8be814dd68" path="/var/lib/kubelet/pods/7c53f02e-113d-486a-b30d-ba8be814dd68/volumes" Sep 13 00:53:30.862743 kubelet[2440]: I0913 00:53:30.862675 2440 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-587c988db9-hrmd8" podStartSLOduration=3.862654439 podStartE2EDuration="3.862654439s" podCreationTimestamp="2025-09-13 00:53:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:53:30.860793624 +0000 UTC m=+74.599063606" watchObservedRunningTime="2025-09-13 00:53:30.862654439 +0000 UTC m=+74.600924421" Sep 13 00:53:30.881000 audit[5877]: NETFILTER_CFG table=filter:141 family=2 entries=8 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:30.881000 audit[5877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff3dbf2ba0 a2=0 a3=7fff3dbf2b8c items=0 ppid=2544 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:30.886000 audit[5877]: NETFILTER_CFG table=nat:142 family=2 entries=40 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:30.886000 audit[5877]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7fff3dbf2ba0 a2=0 a3=7fff3dbf2b8c items=0 ppid=2544 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:31.456259 systemd-networkd[1595]: calic8c1a866828: Gained IPv6LL Sep 13 00:53:31.832000 audit[5853]: AVC avc: denied { watch } for pid=5853 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_53_27.604778253/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c176,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c176,c418 tclass=file permissive=0 Sep 13 00:53:31.832000 audit[5853]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00166f1c0 a2=fc6 a3=0 items=0 ppid=5792 pid=5853 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c176,c418 key=(null) Sep 13 00:53:31.832000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:53:31.914213 env[1437]: time="2025-09-13T00:53:31.914165235Z" level=info msg="StopContainer for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" with timeout 30 (s)" Sep 13 00:53:31.914623 env[1437]: time="2025-09-13T00:53:31.914539638Z" level=info msg="Stop container \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" with signal terminated" Sep 13 00:53:32.045000 audit[5885]: NETFILTER_CFG table=filter:143 family=2 entries=8 op=nft_register_rule pid=5885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:32.045000 audit[5885]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccbcb1c90 a2=0 a3=7ffccbcb1c7c items=0 ppid=2544 pid=5885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:32.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:32.049377 systemd[1]: cri-containerd-b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555.scope: Deactivated successfully. Sep 13 00:53:32.049673 systemd[1]: cri-containerd-b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555.scope: Consumed 1.139s CPU time. Sep 13 00:53:32.048000 audit: BPF prog-id=228 op=UNLOAD Sep 13 00:53:32.052000 audit: BPF prog-id=231 op=UNLOAD Sep 13 00:53:32.077000 audit[5885]: NETFILTER_CFG table=nat:144 family=2 entries=44 op=nft_register_chain pid=5885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:32.077000 audit[5885]: SYSCALL arch=c000003e syscall=46 success=yes exit=14660 a0=3 a1=7ffccbcb1c90 a2=0 a3=7ffccbcb1c7c items=0 ppid=2544 pid=5885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:32.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:32.104347 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555-rootfs.mount: Deactivated successfully. Sep 13 00:53:32.108000 audit[5899]: NETFILTER_CFG table=filter:145 family=2 entries=8 op=nft_register_rule pid=5899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:32.108000 audit[5899]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff7f3c78a0 a2=0 a3=7fff7f3c788c items=0 ppid=2544 pid=5899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:32.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:32.127000 audit[5899]: NETFILTER_CFG table=nat:146 family=2 entries=44 op=nft_unregister_chain pid=5899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:32.127000 audit[5899]: SYSCALL arch=c000003e syscall=46 success=yes exit=12900 a0=3 a1=7fff7f3c78a0 a2=0 a3=7fff7f3c788c items=0 ppid=2544 pid=5899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:32.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:32.222248 env[1437]: time="2025-09-13T00:53:32.222199469Z" level=info msg="shim disconnected" id=b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555 Sep 13 00:53:32.222592 env[1437]: time="2025-09-13T00:53:32.222570272Z" level=warning msg="cleaning up after shim disconnected" id=b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555 namespace=k8s.io Sep 13 00:53:32.222698 env[1437]: time="2025-09-13T00:53:32.222684473Z" level=info msg="cleaning up dead shim" Sep 13 00:53:32.233895 env[1437]: time="2025-09-13T00:53:32.233846661Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:53:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5900 runtime=io.containerd.runc.v2\ntime=\"2025-09-13T00:53:32Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Sep 13 00:53:32.238283 env[1437]: time="2025-09-13T00:53:32.238258196Z" level=info msg="StopContainer for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" returns successfully" Sep 13 00:53:32.239054 env[1437]: time="2025-09-13T00:53:32.239011601Z" level=info msg="StopPodSandbox for \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\"" Sep 13 00:53:32.239166 env[1437]: time="2025-09-13T00:53:32.239111102Z" level=info msg="Container to stop \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 13 00:53:32.243510 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4-shm.mount: Deactivated successfully. Sep 13 00:53:32.255000 audit: BPF prog-id=205 op=UNLOAD Sep 13 00:53:32.256813 systemd[1]: cri-containerd-5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4.scope: Deactivated successfully. Sep 13 00:53:32.259000 audit: BPF prog-id=208 op=UNLOAD Sep 13 00:53:32.285009 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4-rootfs.mount: Deactivated successfully. Sep 13 00:53:32.287767 env[1437]: time="2025-09-13T00:53:32.287712185Z" level=info msg="shim disconnected" id=5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4 Sep 13 00:53:32.287915 env[1437]: time="2025-09-13T00:53:32.287895586Z" level=warning msg="cleaning up after shim disconnected" id=5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4 namespace=k8s.io Sep 13 00:53:32.287998 env[1437]: time="2025-09-13T00:53:32.287985687Z" level=info msg="cleaning up dead shim" Sep 13 00:53:32.298986 env[1437]: time="2025-09-13T00:53:32.298956074Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:53:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5930 runtime=io.containerd.runc.v2\n" Sep 13 00:53:32.386975 systemd-networkd[1595]: calia8561f69b20: Link DOWN Sep 13 00:53:32.386984 systemd-networkd[1595]: calia8561f69b20: Lost carrier Sep 13 00:53:32.492000 audit[5973]: NETFILTER_CFG table=filter:147 family=2 entries=55 op=nft_register_rule pid=5973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:32.492000 audit[5973]: SYSCALL arch=c000003e syscall=46 success=yes exit=8928 a0=3 a1=7ffc26a10af0 a2=0 a3=7ffc26a10adc items=0 ppid=3779 pid=5973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:32.492000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:32.493000 audit[5973]: NETFILTER_CFG table=filter:148 family=2 entries=2 op=nft_unregister_chain pid=5973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:32.493000 audit[5973]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc26a10af0 a2=0 a3=56194d987000 items=0 ppid=3779 pid=5973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:32.493000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.378 [INFO][5954] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.381 [INFO][5954] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" iface="eth0" netns="/var/run/netns/cni-76818061-c449-47d2-554b-4ac33a6d38cc" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.385 [INFO][5954] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" iface="eth0" netns="/var/run/netns/cni-76818061-c449-47d2-554b-4ac33a6d38cc" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.396 [INFO][5954] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" after=11.197588ms iface="eth0" netns="/var/run/netns/cni-76818061-c449-47d2-554b-4ac33a6d38cc" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.396 [INFO][5954] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.396 [INFO][5954] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.437 [INFO][5961] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.437 [INFO][5961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.438 [INFO][5961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.508 [INFO][5961] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.508 [INFO][5961] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.509 [INFO][5961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:32.512227 env[1437]: 2025-09-13 00:53:32.511 [INFO][5954] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:53:32.516667 systemd[1]: run-netns-cni\x2d76818061\x2dc449\x2d47d2\x2d554b\x2d4ac33a6d38cc.mount: Deactivated successfully. Sep 13 00:53:32.517038 env[1437]: time="2025-09-13T00:53:32.516989291Z" level=info msg="TearDown network for sandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" successfully" Sep 13 00:53:32.517038 env[1437]: time="2025-09-13T00:53:32.517028591Z" level=info msg="StopPodSandbox for \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" returns successfully" Sep 13 00:53:32.643924 kubelet[2440]: I0913 00:53:32.643807 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a0959e8f-3150-4ab5-b305-021720265406-calico-apiserver-certs\") pod \"a0959e8f-3150-4ab5-b305-021720265406\" (UID: \"a0959e8f-3150-4ab5-b305-021720265406\") " Sep 13 00:53:32.643924 kubelet[2440]: I0913 00:53:32.643897 2440 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-rcbzt\" (UniqueName: \"kubernetes.io/projected/a0959e8f-3150-4ab5-b305-021720265406-kube-api-access-rcbzt\") pod \"a0959e8f-3150-4ab5-b305-021720265406\" (UID: \"a0959e8f-3150-4ab5-b305-021720265406\") " Sep 13 00:53:32.652750 systemd[1]: var-lib-kubelet-pods-a0959e8f\x2d3150\x2d4ab5\x2db305\x2d021720265406-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2drcbzt.mount: Deactivated successfully. Sep 13 00:53:32.654309 kubelet[2440]: I0913 00:53:32.654273 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a0959e8f-3150-4ab5-b305-021720265406-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "a0959e8f-3150-4ab5-b305-021720265406" (UID: "a0959e8f-3150-4ab5-b305-021720265406"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Sep 13 00:53:32.656579 kubelet[2440]: I0913 00:53:32.656550 2440 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a0959e8f-3150-4ab5-b305-021720265406-kube-api-access-rcbzt" (OuterVolumeSpecName: "kube-api-access-rcbzt") pod "a0959e8f-3150-4ab5-b305-021720265406" (UID: "a0959e8f-3150-4ab5-b305-021720265406"). InnerVolumeSpecName "kube-api-access-rcbzt". PluginName "kubernetes.io/projected", VolumeGidValue "" Sep 13 00:53:32.745158 kubelet[2440]: I0913 00:53:32.745126 2440 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-rcbzt\" (UniqueName: \"kubernetes.io/projected/a0959e8f-3150-4ab5-b305-021720265406-kube-api-access-rcbzt\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:53:32.745370 kubelet[2440]: I0913 00:53:32.745355 2440 reconciler_common.go:293] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a0959e8f-3150-4ab5-b305-021720265406-calico-apiserver-certs\") on node \"ci-3510.3.8-n-93bff2e88f\" DevicePath \"\"" Sep 13 00:53:32.855205 kubelet[2440]: I0913 00:53:32.855174 2440 scope.go:117] "RemoveContainer" containerID="b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555" Sep 13 00:53:32.859129 env[1437]: time="2025-09-13T00:53:32.859070985Z" level=info msg="RemoveContainer for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\"" Sep 13 00:53:32.861570 systemd[1]: Removed slice kubepods-besteffort-poda0959e8f_3150_4ab5_b305_021720265406.slice. Sep 13 00:53:32.861691 systemd[1]: kubepods-besteffort-poda0959e8f_3150_4ab5_b305_021720265406.slice: Consumed 1.178s CPU time. Sep 13 00:53:32.868744 env[1437]: time="2025-09-13T00:53:32.868707060Z" level=info msg="RemoveContainer for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" returns successfully" Sep 13 00:53:32.869079 kubelet[2440]: I0913 00:53:32.869001 2440 scope.go:117] "RemoveContainer" containerID="b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555" Sep 13 00:53:32.869393 env[1437]: time="2025-09-13T00:53:32.869331065Z" level=error msg="ContainerStatus for \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\": not found" Sep 13 00:53:32.869629 kubelet[2440]: E0913 00:53:32.869604 2440 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\": not found" containerID="b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555" Sep 13 00:53:32.869713 kubelet[2440]: I0913 00:53:32.869652 2440 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555"} err="failed to get container status \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\": rpc error: code = NotFound desc = an error occurred when try to find container \"b4f3454921e3422600fdba61752cf96b4428a2c4d445fc0f71a16f2608ca6555\": not found" Sep 13 00:53:33.102625 systemd[1]: var-lib-kubelet-pods-a0959e8f\x2d3150\x2d4ab5\x2db305\x2d021720265406-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Sep 13 00:53:33.214000 audit[5978]: NETFILTER_CFG table=filter:149 family=2 entries=8 op=nft_register_rule pid=5978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:33.214000 audit[5978]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffef9edff50 a2=0 a3=7ffef9edff3c items=0 ppid=2544 pid=5978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:33.220000 audit[5978]: NETFILTER_CFG table=nat:150 family=2 entries=40 op=nft_register_rule pid=5978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:33.220000 audit[5978]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7ffef9edff50 a2=0 a3=7ffef9edff3c items=0 ppid=2544 pid=5978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:34.404390 kubelet[2440]: I0913 00:53:34.404350 2440 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a0959e8f-3150-4ab5-b305-021720265406" path="/var/lib/kubelet/pods/a0959e8f-3150-4ab5-b305-021720265406/volumes" Sep 13 00:53:35.619293 systemd[1]: run-containerd-runc-k8s.io-104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647-runc.gdekzG.mount: Deactivated successfully. Sep 13 00:53:37.432437 kernel: kauditd_printk_skb: 158 callbacks suppressed Sep 13 00:53:37.432767 kernel: audit: type=1130 audit(1757724817.410:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.43:22-10.200.16.10:33830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:37.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.43:22-10.200.16.10:33830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:37.411316 systemd[1]: Started sshd@7-10.200.4.43:22-10.200.16.10:33830.service. Sep 13 00:53:37.998874 sshd[6004]: Accepted publickey for core from 10.200.16.10 port 33830 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:38.000555 sshd[6004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:37.997000 audit[6004]: USER_ACCT pid=6004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.023107 kernel: audit: type=1101 audit(1757724817.997:1561): pid=6004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:37.998000 audit[6004]: CRED_ACQ pid=6004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.046113 kernel: audit: type=1103 audit(1757724817.998:1562): pid=6004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.049162 systemd[1]: Started session-10.scope. Sep 13 00:53:38.049530 systemd-logind[1426]: New session 10 of user core. Sep 13 00:53:37.999000 audit[6004]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1f251850 a2=3 a3=0 items=0 ppid=1 pid=6004 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:38.094197 kernel: audit: type=1006 audit(1757724817.999:1563): pid=6004 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 13 00:53:38.094335 kernel: audit: type=1300 audit(1757724817.999:1563): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1f251850 a2=3 a3=0 items=0 ppid=1 pid=6004 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:37.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:38.055000 audit[6004]: USER_START pid=6004 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.125855 kernel: audit: type=1327 audit(1757724817.999:1563): proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:38.125962 kernel: audit: type=1105 audit(1757724818.055:1564): pid=6004 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.057000 audit[6008]: CRED_ACQ pid=6008 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.146106 kernel: audit: type=1103 audit(1757724818.057:1565): pid=6008 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.260391 systemd[1]: run-containerd-runc-k8s.io-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7-runc.0iDGLG.mount: Deactivated successfully. Sep 13 00:53:38.528508 sshd[6004]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:38.529000 audit[6004]: USER_END pid=6004 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.532271 systemd[1]: sshd@7-10.200.4.43:22-10.200.16.10:33830.service: Deactivated successfully. Sep 13 00:53:38.533073 systemd[1]: session-10.scope: Deactivated successfully. Sep 13 00:53:38.539742 systemd-logind[1426]: Session 10 logged out. Waiting for processes to exit. Sep 13 00:53:38.540744 systemd-logind[1426]: Removed session 10. Sep 13 00:53:38.553113 kernel: audit: type=1106 audit(1757724818.529:1566): pid=6004 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.553192 kernel: audit: type=1104 audit(1757724818.529:1567): pid=6004 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.529000 audit[6004]: CRED_DISP pid=6004 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:38.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.43:22-10.200.16.10:33830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:43.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.43:22-10.200.16.10:51566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:43.634226 systemd[1]: Started sshd@8-10.200.4.43:22-10.200.16.10:51566.service. Sep 13 00:53:43.639948 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:53:43.640109 kernel: audit: type=1130 audit(1757724823.633:1569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.43:22-10.200.16.10:51566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:44.222000 audit[6047]: USER_ACCT pid=6047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.223727 sshd[6047]: Accepted publickey for core from 10.200.16.10 port 51566 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:44.225697 sshd[6047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:44.222000 audit[6047]: CRED_ACQ pid=6047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.261900 systemd[1]: Started session-11.scope. Sep 13 00:53:44.263391 systemd-logind[1426]: New session 11 of user core. Sep 13 00:53:44.264525 kernel: audit: type=1101 audit(1757724824.222:1570): pid=6047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.264605 kernel: audit: type=1103 audit(1757724824.222:1571): pid=6047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.276541 kernel: audit: type=1006 audit(1757724824.222:1572): pid=6047 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Sep 13 00:53:44.222000 audit[6047]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b416220 a2=3 a3=0 items=0 ppid=1 pid=6047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.294985 kernel: audit: type=1300 audit(1757724824.222:1572): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b416220 a2=3 a3=0 items=0 ppid=1 pid=6047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:44.268000 audit[6047]: USER_START pid=6047 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.322939 kernel: audit: type=1327 audit(1757724824.222:1572): proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:44.323064 kernel: audit: type=1105 audit(1757724824.268:1573): pid=6047 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.323119 kernel: audit: type=1103 audit(1757724824.268:1574): pid=6049 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.268000 audit[6049]: CRED_ACQ pid=6049 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.757685 sshd[6047]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:44.757000 audit[6047]: USER_END pid=6047 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.766714 systemd[1]: sshd@8-10.200.4.43:22-10.200.16.10:51566.service: Deactivated successfully. Sep 13 00:53:44.768140 systemd[1]: session-11.scope: Deactivated successfully. Sep 13 00:53:44.768753 systemd-logind[1426]: Session 11 logged out. Waiting for processes to exit. Sep 13 00:53:44.769615 systemd-logind[1426]: Removed session 11. Sep 13 00:53:44.792403 kernel: audit: type=1106 audit(1757724824.757:1575): pid=6047 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.792512 kernel: audit: type=1104 audit(1757724824.763:1576): pid=6047 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.763000 audit[6047]: CRED_DISP pid=6047 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:44.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.43:22-10.200.16.10:51566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:48.867982 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.fiipcS.mount: Deactivated successfully. Sep 13 00:53:48.931903 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.QKw5dB.mount: Deactivated successfully. Sep 13 00:53:49.858108 systemd[1]: run-containerd-runc-k8s.io-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7-runc.ZVwHb1.mount: Deactivated successfully. Sep 13 00:53:49.860670 systemd[1]: Started sshd@9-10.200.4.43:22-10.200.16.10:51580.service. Sep 13 00:53:49.885477 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:53:49.885585 kernel: audit: type=1130 audit(1757724829.859:1578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.43:22-10.200.16.10:51580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:49.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.43:22-10.200.16.10:51580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.447000 audit[6122]: USER_ACCT pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.448764 sshd[6122]: Accepted publickey for core from 10.200.16.10 port 51580 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:50.450681 sshd[6122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:50.471110 kernel: audit: type=1101 audit(1757724830.447:1579): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.449000 audit[6122]: CRED_ACQ pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.479363 systemd[1]: Started session-12.scope. Sep 13 00:53:50.480472 systemd-logind[1426]: New session 12 of user core. Sep 13 00:53:50.493119 kernel: audit: type=1103 audit(1757724830.449:1580): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.493198 kernel: audit: type=1006 audit(1757724830.449:1581): pid=6122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 13 00:53:50.449000 audit[6122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb81ae790 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:50.525599 kernel: audit: type=1300 audit(1757724830.449:1581): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb81ae790 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:50.449000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:50.531945 kernel: audit: type=1327 audit(1757724830.449:1581): proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:50.532017 kernel: audit: type=1105 audit(1757724830.488:1582): pid=6122 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.488000 audit[6122]: USER_START pid=6122 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.490000 audit[6124]: CRED_ACQ pid=6124 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.587490 kernel: audit: type=1103 audit(1757724830.490:1583): pid=6124 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.948732 sshd[6122]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:50.948000 audit[6122]: USER_END pid=6122 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.951201 systemd[1]: sshd@9-10.200.4.43:22-10.200.16.10:51580.service: Deactivated successfully. Sep 13 00:53:50.952212 systemd[1]: session-12.scope: Deactivated successfully. Sep 13 00:53:50.954422 systemd-logind[1426]: Session 12 logged out. Waiting for processes to exit. Sep 13 00:53:50.955294 systemd-logind[1426]: Removed session 12. Sep 13 00:53:50.948000 audit[6122]: CRED_DISP pid=6122 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.997016 kernel: audit: type=1106 audit(1757724830.948:1584): pid=6122 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.997180 kernel: audit: type=1104 audit(1757724830.948:1585): pid=6122 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:50.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.43:22-10.200.16.10:51580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:51.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.43:22-10.200.16.10:47078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:51.080229 systemd[1]: Started sshd@10-10.200.4.43:22-10.200.16.10:47078.service. Sep 13 00:53:51.661266 sshd[6135]: Accepted publickey for core from 10.200.16.10 port 47078 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:51.662918 sshd[6135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:51.660000 audit[6135]: USER_ACCT pid=6135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:51.661000 audit[6135]: CRED_ACQ pid=6135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:51.661000 audit[6135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc05647190 a2=3 a3=0 items=0 ppid=1 pid=6135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:51.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:51.669113 systemd-logind[1426]: New session 13 of user core. Sep 13 00:53:51.669792 systemd[1]: Started session-13.scope. Sep 13 00:53:51.674000 audit[6135]: USER_START pid=6135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:51.675000 audit[6137]: CRED_ACQ pid=6137 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:52.259827 sshd[6135]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:52.260000 audit[6135]: USER_END pid=6135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:52.260000 audit[6135]: CRED_DISP pid=6135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:52.263241 systemd[1]: sshd@10-10.200.4.43:22-10.200.16.10:47078.service: Deactivated successfully. Sep 13 00:53:52.264075 systemd[1]: session-13.scope: Deactivated successfully. Sep 13 00:53:52.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.43:22-10.200.16.10:47078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.264561 systemd-logind[1426]: Session 13 logged out. Waiting for processes to exit. Sep 13 00:53:52.265315 systemd-logind[1426]: Removed session 13. Sep 13 00:53:52.358578 systemd[1]: Started sshd@11-10.200.4.43:22-10.200.16.10:47094.service. Sep 13 00:53:52.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.43:22-10.200.16.10:47094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.937000 audit[6148]: USER_ACCT pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:52.939736 sshd[6148]: Accepted publickey for core from 10.200.16.10 port 47094 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:52.938000 audit[6148]: CRED_ACQ pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:52.938000 audit[6148]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe779f780 a2=3 a3=0 items=0 ppid=1 pid=6148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:52.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:52.940397 sshd[6148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:52.946067 systemd[1]: Started session-14.scope. Sep 13 00:53:52.946694 systemd-logind[1426]: New session 14 of user core. Sep 13 00:53:52.951000 audit[6148]: USER_START pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:52.953000 audit[6152]: CRED_ACQ pid=6152 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:53.445270 sshd[6148]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:53.445000 audit[6148]: USER_END pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:53.445000 audit[6148]: CRED_DISP pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:53.448415 systemd-logind[1426]: Session 14 logged out. Waiting for processes to exit. Sep 13 00:53:53.448635 systemd[1]: sshd@11-10.200.4.43:22-10.200.16.10:47094.service: Deactivated successfully. Sep 13 00:53:53.449475 systemd[1]: session-14.scope: Deactivated successfully. Sep 13 00:53:53.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.43:22-10.200.16.10:47094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:53.450416 systemd-logind[1426]: Removed session 14. Sep 13 00:53:58.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.43:22-10.200.16.10:47100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:58.543627 systemd[1]: Started sshd@12-10.200.4.43:22-10.200.16.10:47100.service. Sep 13 00:53:58.549217 kernel: kauditd_printk_skb: 23 callbacks suppressed Sep 13 00:53:58.549281 kernel: audit: type=1130 audit(1757724838.542:1605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.43:22-10.200.16.10:47100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.130054 sshd[6161]: Accepted publickey for core from 10.200.16.10 port 47100 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:59.131768 sshd[6161]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:59.128000 audit[6161]: USER_ACCT pid=6161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.154147 kernel: audit: type=1101 audit(1757724839.128:1606): pid=6161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.130000 audit[6161]: CRED_ACQ pid=6161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.159038 systemd[1]: Started session-15.scope. Sep 13 00:53:59.160130 systemd-logind[1426]: New session 15 of user core. Sep 13 00:53:59.176113 kernel: audit: type=1103 audit(1757724839.130:1607): pid=6161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.130000 audit[6161]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde96d27c0 a2=3 a3=0 items=0 ppid=1 pid=6161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:59.212508 kernel: audit: type=1006 audit(1757724839.130:1608): pid=6161 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Sep 13 00:53:59.212630 kernel: audit: type=1300 audit(1757724839.130:1608): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde96d27c0 a2=3 a3=0 items=0 ppid=1 pid=6161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:59.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:59.165000 audit[6161]: USER_START pid=6161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.243550 kernel: audit: type=1327 audit(1757724839.130:1608): proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:59.243663 kernel: audit: type=1105 audit(1757724839.165:1609): pid=6161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.176000 audit[6163]: CRED_ACQ pid=6163 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.264126 kernel: audit: type=1103 audit(1757724839.176:1610): pid=6163 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.706630 sshd[6161]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:59.706000 audit[6161]: USER_END pid=6161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.722994 systemd[1]: sshd@12-10.200.4.43:22-10.200.16.10:47100.service: Deactivated successfully. Sep 13 00:53:59.723758 systemd[1]: session-15.scope: Deactivated successfully. Sep 13 00:53:59.725311 systemd-logind[1426]: Session 15 logged out. Waiting for processes to exit. Sep 13 00:53:59.726349 systemd-logind[1426]: Removed session 15. Sep 13 00:53:59.717000 audit[6161]: CRED_DISP pid=6161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.751106 kernel: audit: type=1106 audit(1757724839.706:1611): pid=6161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.751227 kernel: audit: type=1104 audit(1757724839.717:1612): pid=6161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:59.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.43:22-10.200.16.10:47100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:04.839293 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:54:04.839456 kernel: audit: type=1130 audit(1757724844.803:1614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.43:22-10.200.16.10:38268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:04.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.43:22-10.200.16.10:38268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:04.804561 systemd[1]: Started sshd@13-10.200.4.43:22-10.200.16.10:38268.service. Sep 13 00:54:05.384000 audit[6178]: USER_ACCT pid=6178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.407788 sshd[6178]: Accepted publickey for core from 10.200.16.10 port 38268 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:05.408140 kernel: audit: type=1101 audit(1757724845.384:1615): pid=6178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.408389 sshd[6178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:05.406000 audit[6178]: CRED_ACQ pid=6178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.413675 systemd-logind[1426]: New session 16 of user core. Sep 13 00:54:05.415307 systemd[1]: Started session-16.scope. Sep 13 00:54:05.430454 kernel: audit: type=1103 audit(1757724845.406:1616): pid=6178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.430557 kernel: audit: type=1006 audit(1757724845.406:1617): pid=6178 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Sep 13 00:54:05.406000 audit[6178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9eb35d80 a2=3 a3=0 items=0 ppid=1 pid=6178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:05.471189 kernel: audit: type=1300 audit(1757724845.406:1617): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9eb35d80 a2=3 a3=0 items=0 ppid=1 pid=6178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:05.406000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:05.478476 kernel: audit: type=1327 audit(1757724845.406:1617): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:05.417000 audit[6178]: USER_START pid=6178 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.499604 kernel: audit: type=1105 audit(1757724845.417:1618): pid=6178 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.427000 audit[6180]: CRED_ACQ pid=6180 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.517174 kernel: audit: type=1103 audit(1757724845.427:1619): pid=6180 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.597424 systemd[1]: run-containerd-runc-k8s.io-104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647-runc.Q6GGiy.mount: Deactivated successfully. Sep 13 00:54:05.881445 sshd[6178]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:05.881000 audit[6178]: USER_END pid=6178 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.884317 systemd[1]: sshd@13-10.200.4.43:22-10.200.16.10:38268.service: Deactivated successfully. Sep 13 00:54:05.884938 systemd[1]: session-16.scope: Deactivated successfully. Sep 13 00:54:05.886110 systemd-logind[1426]: Session 16 logged out. Waiting for processes to exit. Sep 13 00:54:05.887009 systemd-logind[1426]: Removed session 16. Sep 13 00:54:05.912569 kernel: audit: type=1106 audit(1757724845.881:1620): pid=6178 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.914039 kernel: audit: type=1104 audit(1757724845.881:1621): pid=6178 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.881000 audit[6178]: CRED_DISP pid=6178 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:05.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.43:22-10.200.16.10:38268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.981047 systemd[1]: Started sshd@14-10.200.4.43:22-10.200.16.10:42082.service. Sep 13 00:54:11.008125 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:54:11.008239 kernel: audit: type=1130 audit(1757724850.980:1623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.43:22-10.200.16.10:42082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.43:22-10.200.16.10:42082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.566000 audit[6211]: USER_ACCT pid=6211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.589616 sshd[6211]: Accepted publickey for core from 10.200.16.10 port 42082 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:11.590113 kernel: audit: type=1101 audit(1757724851.566:1624): pid=6211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.591420 sshd[6211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:11.589000 audit[6211]: CRED_ACQ pid=6211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.598594 systemd[1]: Started session-17.scope. Sep 13 00:54:11.599794 systemd-logind[1426]: New session 17 of user core. Sep 13 00:54:11.620110 kernel: audit: type=1103 audit(1757724851.589:1625): pid=6211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.589000 audit[6211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd538440e0 a2=3 a3=0 items=0 ppid=1 pid=6211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:11.659262 kernel: audit: type=1006 audit(1757724851.589:1626): pid=6211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 13 00:54:11.659390 kernel: audit: type=1300 audit(1757724851.589:1626): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd538440e0 a2=3 a3=0 items=0 ppid=1 pid=6211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:11.659426 kernel: audit: type=1327 audit(1757724851.589:1626): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:11.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:11.605000 audit[6211]: USER_START pid=6211 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.688185 kernel: audit: type=1105 audit(1757724851.605:1627): pid=6211 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.688279 kernel: audit: type=1103 audit(1757724851.607:1628): pid=6213 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:11.607000 audit[6213]: CRED_ACQ pid=6213 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:12.130627 sshd[6211]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:12.130000 audit[6211]: USER_END pid=6211 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:12.133208 systemd[1]: sshd@14-10.200.4.43:22-10.200.16.10:42082.service: Deactivated successfully. Sep 13 00:54:12.134304 systemd[1]: session-17.scope: Deactivated successfully. Sep 13 00:54:12.135970 systemd-logind[1426]: Session 17 logged out. Waiting for processes to exit. Sep 13 00:54:12.136923 systemd-logind[1426]: Removed session 17. Sep 13 00:54:12.130000 audit[6211]: CRED_DISP pid=6211 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:12.173145 kernel: audit: type=1106 audit(1757724852.130:1629): pid=6211 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:12.173261 kernel: audit: type=1104 audit(1757724852.130:1630): pid=6211 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:12.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.43:22-10.200.16.10:42082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:13.291000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.291000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.291000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cfc7b0 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:13.291000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221a640 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:13.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:13.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:13.593000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7411 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.593000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c001000000 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:54:13.593000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:13.594000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.594000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c006efc5a0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:54:13.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:13.596000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.596000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00fa4b000 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:54:13.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:13.616000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.616000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00fa4ba80 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:54:13.616000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:13.616000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.616000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c005aa0240 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:54:13.616000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:13.616000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7417 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:13.616000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c005aa0300 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:54:13.616000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:17.246537 kernel: kauditd_printk_skb: 25 callbacks suppressed Sep 13 00:54:17.246663 kernel: audit: type=1130 audit(1757724857.229:1640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.43:22-10.200.16.10:42088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:17.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.43:22-10.200.16.10:42088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:17.229922 systemd[1]: Started sshd@15-10.200.4.43:22-10.200.16.10:42088.service. Sep 13 00:54:17.506000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.543137 kernel: audit: type=1400 audit(1757724857.506:1641): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.543285 kernel: audit: type=1300 audit(1757724857.506:1641): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000efd340 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.506000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000efd340 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.506000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.592311 kernel: audit: type=1327 audit(1757724857.506:1641): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.592448 kernel: audit: type=1400 audit(1757724857.506:1642): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.592482 kernel: audit: type=1300 audit(1757724857.506:1642): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221ad40 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.506000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221ad40 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.647112 kernel: audit: type=1327 audit(1757724857.506:1642): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.506000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.673111 kernel: audit: type=1400 audit(1757724857.506:1643): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.506000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221ad60 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.701113 kernel: audit: type=1300 audit(1757724857.506:1643): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221ad60 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.723116 kernel: audit: type=1327 audit(1757724857.506:1643): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.506000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:17.506000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221ad80 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:54:17.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:17.845497 sshd[6227]: Accepted publickey for core from 10.200.16.10 port 42088 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:17.844000 audit[6227]: USER_ACCT pid=6227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:17.846000 audit[6227]: CRED_ACQ pid=6227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:17.847000 audit[6227]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25dbb8e0 a2=3 a3=0 items=0 ppid=1 pid=6227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:17.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:17.848874 sshd[6227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:17.855324 systemd-logind[1426]: New session 18 of user core. Sep 13 00:54:17.856076 systemd[1]: Started session-18.scope. Sep 13 00:54:17.861000 audit[6227]: USER_START pid=6227 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:17.863000 audit[6229]: CRED_ACQ pid=6229 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:18.356061 sshd[6227]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:18.356000 audit[6227]: USER_END pid=6227 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:18.356000 audit[6227]: CRED_DISP pid=6227 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:18.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.43:22-10.200.16.10:42088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:18.358878 systemd[1]: sshd@15-10.200.4.43:22-10.200.16.10:42088.service: Deactivated successfully. Sep 13 00:54:18.361000 systemd[1]: session-18.scope: Deactivated successfully. Sep 13 00:54:18.362465 systemd-logind[1426]: Session 18 logged out. Waiting for processes to exit. Sep 13 00:54:18.363463 systemd-logind[1426]: Removed session 18. Sep 13 00:54:18.929642 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.RvcGLy.mount: Deactivated successfully. Sep 13 00:54:18.949313 systemd[1]: run-containerd-runc-k8s.io-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7-runc.CSH3lg.mount: Deactivated successfully. Sep 13 00:54:20.594251 env[1437]: time="2025-09-13T00:54:20.594057829Z" level=info msg="StopPodSandbox for \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\"" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.632 [WARNING][6291] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.632 [INFO][6291] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.632 [INFO][6291] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" iface="eth0" netns="" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.632 [INFO][6291] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.632 [INFO][6291] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.653 [INFO][6298] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.653 [INFO][6298] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.654 [INFO][6298] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.660 [WARNING][6298] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.660 [INFO][6298] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.662 [INFO][6298] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:20.665343 env[1437]: 2025-09-13 00:54:20.664 [INFO][6291] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.666158 env[1437]: time="2025-09-13T00:54:20.666077005Z" level=info msg="TearDown network for sandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" successfully" Sep 13 00:54:20.666234 env[1437]: time="2025-09-13T00:54:20.666213997Z" level=info msg="StopPodSandbox for \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" returns successfully" Sep 13 00:54:20.666749 env[1437]: time="2025-09-13T00:54:20.666727966Z" level=info msg="RemovePodSandbox for \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\"" Sep 13 00:54:20.666881 env[1437]: time="2025-09-13T00:54:20.666845059Z" level=info msg="Forcibly stopping sandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\"" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.699 [WARNING][6312] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.699 [INFO][6312] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.699 [INFO][6312] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" iface="eth0" netns="" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.699 [INFO][6312] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.699 [INFO][6312] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.732 [INFO][6319] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.732 [INFO][6319] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.732 [INFO][6319] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.738 [WARNING][6319] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.738 [INFO][6319] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" HandleID="k8s-pod-network.8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--qgdmr-eth0" Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.739 [INFO][6319] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:20.741761 env[1437]: 2025-09-13 00:54:20.740 [INFO][6312] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b" Sep 13 00:54:20.742420 env[1437]: time="2025-09-13T00:54:20.741791758Z" level=info msg="TearDown network for sandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" successfully" Sep 13 00:54:20.749589 env[1437]: time="2025-09-13T00:54:20.749496696Z" level=info msg="RemovePodSandbox \"8e550050570ea18150ae42385a305080f3a24d1597d66a15a7c68bd2ca646f9b\" returns successfully" Sep 13 00:54:20.750148 env[1437]: time="2025-09-13T00:54:20.750102359Z" level=info msg="StopPodSandbox for \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\"" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.785 [WARNING][6333] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.785 [INFO][6333] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.785 [INFO][6333] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" iface="eth0" netns="" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.785 [INFO][6333] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.785 [INFO][6333] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.816 [INFO][6340] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.817 [INFO][6340] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.817 [INFO][6340] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.825 [WARNING][6340] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.825 [INFO][6340] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.827 [INFO][6340] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:20.830727 env[1437]: 2025-09-13 00:54:20.829 [INFO][6333] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.831248 env[1437]: time="2025-09-13T00:54:20.831217289Z" level=info msg="TearDown network for sandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" successfully" Sep 13 00:54:20.831313 env[1437]: time="2025-09-13T00:54:20.831301284Z" level=info msg="StopPodSandbox for \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" returns successfully" Sep 13 00:54:20.831778 env[1437]: time="2025-09-13T00:54:20.831752857Z" level=info msg="RemovePodSandbox for \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\"" Sep 13 00:54:20.831903 env[1437]: time="2025-09-13T00:54:20.831873449Z" level=info msg="Forcibly stopping sandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\"" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.864 [WARNING][6355] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" WorkloadEndpoint="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.864 [INFO][6355] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.864 [INFO][6355] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" iface="eth0" netns="" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.864 [INFO][6355] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.864 [INFO][6355] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.884 [INFO][6362] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.884 [INFO][6362] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.884 [INFO][6362] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.889 [WARNING][6362] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.889 [INFO][6362] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" HandleID="k8s-pod-network.5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Workload="ci--3510.3.8--n--93bff2e88f-k8s-calico--apiserver--8cb864958--wj2gj-eth0" Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.890 [INFO][6362] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:20.892853 env[1437]: 2025-09-13 00:54:20.891 [INFO][6355] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4" Sep 13 00:54:20.893342 env[1437]: time="2025-09-13T00:54:20.893153670Z" level=info msg="TearDown network for sandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" successfully" Sep 13 00:54:20.900716 env[1437]: time="2025-09-13T00:54:20.900635121Z" level=info msg="RemovePodSandbox \"5bb657f2673331303bb282cebac654d0cf10f809be730d3c05760df5c8b133e4\" returns successfully" Sep 13 00:54:23.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.43:22-10.200.16.10:41510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:23.464614 systemd[1]: Started sshd@16-10.200.4.43:22-10.200.16.10:41510.service. Sep 13 00:54:23.472211 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:54:23.472289 kernel: audit: type=1130 audit(1757724863.463:1653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.43:22-10.200.16.10:41510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:24.046000 audit[6372]: USER_ACCT pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.049242 sshd[6372]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:24.068891 sshd[6372]: Accepted publickey for core from 10.200.16.10 port 41510 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:24.069101 kernel: audit: type=1101 audit(1757724864.046:1654): pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.047000 audit[6372]: CRED_ACQ pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.076499 systemd-logind[1426]: New session 19 of user core. Sep 13 00:54:24.093697 systemd[1]: Started session-19.scope. Sep 13 00:54:24.103694 kernel: audit: type=1103 audit(1757724864.047:1655): pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.103788 kernel: audit: type=1006 audit(1757724864.047:1656): pid=6372 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Sep 13 00:54:24.115401 kernel: audit: type=1300 audit(1757724864.047:1656): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43bd3e60 a2=3 a3=0 items=0 ppid=1 pid=6372 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:24.047000 audit[6372]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43bd3e60 a2=3 a3=0 items=0 ppid=1 pid=6372 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:24.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:24.129034 kernel: audit: type=1327 audit(1757724864.047:1656): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:24.129131 kernel: audit: type=1105 audit(1757724864.095:1657): pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.095000 audit[6372]: USER_START pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.095000 audit[6374]: CRED_ACQ pid=6374 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.174113 kernel: audit: type=1103 audit(1757724864.095:1658): pid=6374 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.576053 sshd[6372]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:24.576000 audit[6372]: USER_END pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.602112 kernel: audit: type=1106 audit(1757724864.576:1659): pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.604450 systemd-logind[1426]: Session 19 logged out. Waiting for processes to exit. Sep 13 00:54:24.605968 systemd[1]: sshd@16-10.200.4.43:22-10.200.16.10:41510.service: Deactivated successfully. Sep 13 00:54:24.606872 systemd[1]: session-19.scope: Deactivated successfully. Sep 13 00:54:24.608421 systemd-logind[1426]: Removed session 19. Sep 13 00:54:24.601000 audit[6372]: CRED_DISP pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.43:22-10.200.16.10:41510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:24.628333 kernel: audit: type=1104 audit(1757724864.601:1660): pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:24.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.43:22-10.200.16.10:41520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:24.676276 systemd[1]: Started sshd@17-10.200.4.43:22-10.200.16.10:41520.service. Sep 13 00:54:25.264000 audit[6383]: USER_ACCT pid=6383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:25.265792 sshd[6383]: Accepted publickey for core from 10.200.16.10 port 41520 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:25.265000 audit[6383]: CRED_ACQ pid=6383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:25.265000 audit[6383]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc97b259c0 a2=3 a3=0 items=0 ppid=1 pid=6383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:25.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:25.267304 sshd[6383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:25.271910 systemd-logind[1426]: New session 20 of user core. Sep 13 00:54:25.272530 systemd[1]: Started session-20.scope. Sep 13 00:54:25.276000 audit[6383]: USER_START pid=6383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:25.278000 audit[6385]: CRED_ACQ pid=6385 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:25.791950 sshd[6383]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:25.792000 audit[6383]: USER_END pid=6383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:25.792000 audit[6383]: CRED_DISP pid=6383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:25.795318 systemd-logind[1426]: Session 20 logged out. Waiting for processes to exit. Sep 13 00:54:25.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.43:22-10.200.16.10:41520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:25.795829 systemd[1]: sshd@17-10.200.4.43:22-10.200.16.10:41520.service: Deactivated successfully. Sep 13 00:54:25.796712 systemd[1]: session-20.scope: Deactivated successfully. Sep 13 00:54:25.798493 systemd-logind[1426]: Removed session 20. Sep 13 00:54:25.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.43:22-10.200.16.10:41530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:25.896740 systemd[1]: Started sshd@18-10.200.4.43:22-10.200.16.10:41530.service. Sep 13 00:54:26.485000 audit[6392]: USER_ACCT pid=6392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:26.486659 sshd[6392]: Accepted publickey for core from 10.200.16.10 port 41530 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:26.487000 audit[6392]: CRED_ACQ pid=6392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:26.487000 audit[6392]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3450fa50 a2=3 a3=0 items=0 ppid=1 pid=6392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:26.487000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:26.488540 sshd[6392]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:26.494995 systemd[1]: Started session-21.scope. Sep 13 00:54:26.497039 systemd-logind[1426]: New session 21 of user core. Sep 13 00:54:26.503000 audit[6392]: USER_START pid=6392 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:26.505000 audit[6394]: CRED_ACQ pid=6394 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:26.975000 audit[5256]: AVC avc: denied { watch } for pid=5256 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_48.4267136563/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c335,c695 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c335,c695 tclass=file permissive=0 Sep 13 00:54:26.975000 audit[5256]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001be15a0 a2=fc6 a3=0 items=0 ppid=4850 pid=5256 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c335,c695 key=(null) Sep 13 00:54:26.975000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:54:29.122191 kernel: kauditd_printk_skb: 23 callbacks suppressed Sep 13 00:54:29.122343 kernel: audit: type=1325 audit(1757724869.100:1678): table=filter:151 family=2 entries=20 op=nft_register_rule pid=6404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.100000 audit[6404]: NETFILTER_CFG table=filter:151 family=2 entries=20 op=nft_register_rule pid=6404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.100000 audit[6404]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe1e9e1340 a2=0 a3=7ffe1e9e132c items=0 ppid=2544 pid=6404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.158118 kernel: audit: type=1300 audit(1757724869.100:1678): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe1e9e1340 a2=0 a3=7ffe1e9e132c items=0 ppid=2544 pid=6404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.173116 kernel: audit: type=1327 audit(1757724869.100:1678): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.136000 audit[6404]: NETFILTER_CFG table=nat:152 family=2 entries=26 op=nft_register_rule pid=6404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.186146 kernel: audit: type=1325 audit(1757724869.136:1679): table=nat:152 family=2 entries=26 op=nft_register_rule pid=6404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.136000 audit[6404]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe1e9e1340 a2=0 a3=0 items=0 ppid=2544 pid=6404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.216131 kernel: audit: type=1300 audit(1757724869.136:1679): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe1e9e1340 a2=0 a3=0 items=0 ppid=2544 pid=6404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.216247 kernel: audit: type=1327 audit(1757724869.136:1679): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.230937 sshd[6392]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:29.234150 systemd-logind[1426]: Session 21 logged out. Waiting for processes to exit. Sep 13 00:54:29.235543 systemd[1]: sshd@18-10.200.4.43:22-10.200.16.10:41530.service: Deactivated successfully. Sep 13 00:54:29.236519 systemd[1]: session-21.scope: Deactivated successfully. Sep 13 00:54:29.238063 systemd-logind[1426]: Removed session 21. Sep 13 00:54:29.210000 audit[6406]: NETFILTER_CFG table=filter:153 family=2 entries=32 op=nft_register_rule pid=6406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.251104 kernel: audit: type=1325 audit(1757724869.210:1680): table=filter:153 family=2 entries=32 op=nft_register_rule pid=6406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.210000 audit[6406]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe66a72ad0 a2=0 a3=7ffe66a72abc items=0 ppid=2544 pid=6406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.275108 kernel: audit: type=1300 audit(1757724869.210:1680): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe66a72ad0 a2=0 a3=7ffe66a72abc items=0 ppid=2544 pid=6406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.230000 audit[6392]: USER_END pid=6392 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:29.311699 kernel: audit: type=1327 audit(1757724869.210:1680): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.311801 kernel: audit: type=1106 audit(1757724869.230:1681): pid=6392 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:29.231000 audit[6392]: CRED_DISP pid=6392 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:29.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.43:22-10.200.16.10:41530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:29.239000 audit[6406]: NETFILTER_CFG table=nat:154 family=2 entries=26 op=nft_register_rule pid=6406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.239000 audit[6406]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe66a72ad0 a2=0 a3=0 items=0 ppid=2544 pid=6406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.43:22-10.200.16.10:41540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:29.324131 systemd[1]: Started sshd@19-10.200.4.43:22-10.200.16.10:41540.service. Sep 13 00:54:29.918000 audit[6409]: USER_ACCT pid=6409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:29.919569 sshd[6409]: Accepted publickey for core from 10.200.16.10 port 41540 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:29.919000 audit[6409]: CRED_ACQ pid=6409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:29.921213 sshd[6409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:29.919000 audit[6409]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b5f03e0 a2=3 a3=0 items=0 ppid=1 pid=6409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:29.927384 systemd[1]: Started session-22.scope. Sep 13 00:54:29.928055 systemd-logind[1426]: New session 22 of user core. Sep 13 00:54:29.933000 audit[6409]: USER_START pid=6409 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:29.935000 audit[6411]: CRED_ACQ pid=6411 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:30.618084 sshd[6409]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:30.618000 audit[6409]: USER_END pid=6409 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:30.618000 audit[6409]: CRED_DISP pid=6409 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:30.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.43:22-10.200.16.10:41540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:30.620931 systemd[1]: sshd@19-10.200.4.43:22-10.200.16.10:41540.service: Deactivated successfully. Sep 13 00:54:30.623057 systemd[1]: session-22.scope: Deactivated successfully. Sep 13 00:54:30.624013 systemd-logind[1426]: Session 22 logged out. Waiting for processes to exit. Sep 13 00:54:30.624856 systemd-logind[1426]: Removed session 22. Sep 13 00:54:30.715667 systemd[1]: Started sshd@20-10.200.4.43:22-10.200.16.10:36508.service. Sep 13 00:54:30.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.43:22-10.200.16.10:36508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:31.305178 sshd[6419]: Accepted publickey for core from 10.200.16.10 port 36508 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:31.306827 sshd[6419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:31.303000 audit[6419]: USER_ACCT pid=6419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:31.305000 audit[6419]: CRED_ACQ pid=6419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:31.305000 audit[6419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2c8d6130 a2=3 a3=0 items=0 ppid=1 pid=6419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:31.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:31.312745 systemd[1]: Started session-23.scope. Sep 13 00:54:31.313549 systemd-logind[1426]: New session 23 of user core. Sep 13 00:54:31.319000 audit[6419]: USER_START pid=6419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:31.324000 audit[6421]: CRED_ACQ pid=6421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:31.785894 sshd[6419]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:31.786000 audit[6419]: USER_END pid=6419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:31.786000 audit[6419]: CRED_DISP pid=6419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:31.788528 systemd[1]: sshd@20-10.200.4.43:22-10.200.16.10:36508.service: Deactivated successfully. Sep 13 00:54:31.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.43:22-10.200.16.10:36508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:31.789699 systemd-logind[1426]: Session 23 logged out. Waiting for processes to exit. Sep 13 00:54:31.789779 systemd[1]: session-23.scope: Deactivated successfully. Sep 13 00:54:31.791189 systemd-logind[1426]: Removed session 23. Sep 13 00:54:31.843000 audit[5853]: AVC avc: denied { watch } for pid=5853 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_53_27.604778253/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c176,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c176,c418 tclass=file permissive=0 Sep 13 00:54:31.843000 audit[5853]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006804a0 a2=fc6 a3=0 items=0 ppid=5792 pid=5853 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c176,c418 key=(null) Sep 13 00:54:31.843000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:54:35.615905 systemd[1]: run-containerd-runc-k8s.io-104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647-runc.Ja7vqe.mount: Deactivated successfully. Sep 13 00:54:36.918765 kernel: kauditd_printk_skb: 30 callbacks suppressed Sep 13 00:54:36.918934 kernel: audit: type=1130 audit(1757724876.885:1704): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.43:22-10.200.16.10:36510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:36.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.43:22-10.200.16.10:36510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:36.886231 systemd[1]: Started sshd@21-10.200.4.43:22-10.200.16.10:36510.service. Sep 13 00:54:37.473000 audit[6466]: USER_ACCT pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.474548 sshd[6466]: Accepted publickey for core from 10.200.16.10 port 36510 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:37.476244 sshd[6466]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:37.494117 kernel: audit: type=1101 audit(1757724877.473:1705): pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.499292 systemd-logind[1426]: New session 24 of user core. Sep 13 00:54:37.500823 systemd[1]: Started session-24.scope. Sep 13 00:54:37.474000 audit[6466]: CRED_ACQ pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.535831 kernel: audit: type=1103 audit(1757724877.474:1706): pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.535938 kernel: audit: type=1006 audit(1757724877.474:1707): pid=6466 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Sep 13 00:54:37.474000 audit[6466]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0a4fcae0 a2=3 a3=0 items=0 ppid=1 pid=6466 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:37.545104 kernel: audit: type=1300 audit(1757724877.474:1707): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0a4fcae0 a2=3 a3=0 items=0 ppid=1 pid=6466 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:37.564319 kernel: audit: type=1327 audit(1757724877.474:1707): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:37.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:37.571102 kernel: audit: type=1105 audit(1757724877.505:1708): pid=6466 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.505000 audit[6466]: USER_START pid=6466 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.507000 audit[6475]: CRED_ACQ pid=6475 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:37.609336 kernel: audit: type=1103 audit(1757724877.507:1709): pid=6475 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:38.030687 sshd[6466]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:38.031000 audit[6466]: USER_END pid=6466 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:38.033625 systemd[1]: sshd@21-10.200.4.43:22-10.200.16.10:36510.service: Deactivated successfully. Sep 13 00:54:38.034716 systemd[1]: session-24.scope: Deactivated successfully. Sep 13 00:54:38.036402 systemd-logind[1426]: Session 24 logged out. Waiting for processes to exit. Sep 13 00:54:38.037396 systemd-logind[1426]: Removed session 24. Sep 13 00:54:38.054546 kernel: audit: type=1106 audit(1757724878.031:1710): pid=6466 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:38.054661 kernel: audit: type=1104 audit(1757724878.031:1711): pid=6466 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:38.031000 audit[6466]: CRED_DISP pid=6466 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:38.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.43:22-10.200.16.10:36510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:38.268218 systemd[1]: run-containerd-runc-k8s.io-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7-runc.OVbNFL.mount: Deactivated successfully. Sep 13 00:54:43.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.43:22-10.200.16.10:51814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:43.129706 systemd[1]: Started sshd@22-10.200.4.43:22-10.200.16.10:51814.service. Sep 13 00:54:43.154035 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:54:43.154200 kernel: audit: type=1130 audit(1757724883.128:1713): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.43:22-10.200.16.10:51814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:43.708000 audit[6502]: USER_ACCT pid=6502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.730118 kernel: audit: type=1101 audit(1757724883.708:1714): pid=6502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.711541 sshd[6502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:43.730469 sshd[6502]: Accepted publickey for core from 10.200.16.10 port 51814 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:43.709000 audit[6502]: CRED_ACQ pid=6502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.745038 systemd[1]: Started session-25.scope. Sep 13 00:54:43.746147 systemd-logind[1426]: New session 25 of user core. Sep 13 00:54:43.752126 kernel: audit: type=1103 audit(1757724883.709:1715): pid=6502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.765142 kernel: audit: type=1006 audit(1757724883.710:1716): pid=6502 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Sep 13 00:54:43.710000 audit[6502]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd366267b0 a2=3 a3=0 items=0 ppid=1 pid=6502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:43.785169 kernel: audit: type=1300 audit(1757724883.710:1716): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd366267b0 a2=3 a3=0 items=0 ppid=1 pid=6502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:43.785288 kernel: audit: type=1327 audit(1757724883.710:1716): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:43.710000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:43.752000 audit[6502]: USER_START pid=6502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.813608 kernel: audit: type=1105 audit(1757724883.752:1717): pid=6502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.814343 kernel: audit: type=1103 audit(1757724883.765:1718): pid=6504 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:43.765000 audit[6504]: CRED_ACQ pid=6504 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:44.248425 sshd[6502]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:44.248000 audit[6502]: USER_END pid=6502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:44.275112 kernel: audit: type=1106 audit(1757724884.248:1719): pid=6502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:44.273941 systemd[1]: sshd@22-10.200.4.43:22-10.200.16.10:51814.service: Deactivated successfully. Sep 13 00:54:44.274937 systemd[1]: session-25.scope: Deactivated successfully. Sep 13 00:54:44.276539 systemd-logind[1426]: Session 25 logged out. Waiting for processes to exit. Sep 13 00:54:44.277434 systemd-logind[1426]: Removed session 25. Sep 13 00:54:44.248000 audit[6502]: CRED_DISP pid=6502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:44.299103 kernel: audit: type=1104 audit(1757724884.248:1720): pid=6502 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:44.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.43:22-10.200.16.10:51814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:48.861170 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.nJV886.mount: Deactivated successfully. Sep 13 00:54:48.967197 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.hZfHyI.mount: Deactivated successfully. Sep 13 00:54:49.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.43:22-10.200.16.10:51816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:49.346757 systemd[1]: Started sshd@23-10.200.4.43:22-10.200.16.10:51816.service. Sep 13 00:54:49.374984 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:54:49.375117 kernel: audit: type=1130 audit(1757724889.346:1722): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.43:22-10.200.16.10:51816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:49.953000 audit[6568]: USER_ACCT pid=6568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:49.955527 sshd[6568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:49.974804 sshd[6568]: Accepted publickey for core from 10.200.16.10 port 51816 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:49.975107 kernel: audit: type=1101 audit(1757724889.953:1723): pid=6568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:49.954000 audit[6568]: CRED_ACQ pid=6568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:49.987784 systemd[1]: Started session-26.scope. Sep 13 00:54:49.988872 systemd-logind[1426]: New session 26 of user core. Sep 13 00:54:50.016865 kernel: audit: type=1103 audit(1757724889.954:1724): pid=6568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.017011 kernel: audit: type=1006 audit(1757724889.955:1725): pid=6568 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Sep 13 00:54:49.955000 audit[6568]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f2bf460 a2=3 a3=0 items=0 ppid=1 pid=6568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:49.955000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:50.052327 kernel: audit: type=1300 audit(1757724889.955:1725): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f2bf460 a2=3 a3=0 items=0 ppid=1 pid=6568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:50.052431 kernel: audit: type=1327 audit(1757724889.955:1725): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:50.052462 kernel: audit: type=1105 audit(1757724889.991:1726): pid=6568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:49.991000 audit[6568]: USER_START pid=6568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:49.996000 audit[6570]: CRED_ACQ pid=6570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.111468 kernel: audit: type=1103 audit(1757724889.996:1727): pid=6570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.423480 sshd[6568]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:50.424000 audit[6568]: USER_END pid=6568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.426246 systemd[1]: sshd@23-10.200.4.43:22-10.200.16.10:51816.service: Deactivated successfully. Sep 13 00:54:50.427985 systemd-logind[1426]: Session 26 logged out. Waiting for processes to exit. Sep 13 00:54:50.425000 audit[6568]: CRED_DISP pid=6568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.451259 systemd[1]: session-26.scope: Deactivated successfully. Sep 13 00:54:50.452413 systemd-logind[1426]: Removed session 26. Sep 13 00:54:50.482254 kernel: audit: type=1106 audit(1757724890.424:1728): pid=6568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.482389 kernel: audit: type=1104 audit(1757724890.425:1729): pid=6568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:50.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.43:22-10.200.16.10:51816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:52.175000 audit[6580]: NETFILTER_CFG table=filter:155 family=2 entries=20 op=nft_register_rule pid=6580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:52.175000 audit[6580]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc1cd5f4a0 a2=0 a3=7ffc1cd5f48c items=0 ppid=2544 pid=6580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:52.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:52.182000 audit[6580]: NETFILTER_CFG table=nat:156 family=2 entries=110 op=nft_register_chain pid=6580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:52.182000 audit[6580]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc1cd5f4a0 a2=0 a3=7ffc1cd5f48c items=0 ppid=2544 pid=6580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:52.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:55.521032 systemd[1]: Started sshd@24-10.200.4.43:22-10.200.16.10:35398.service. Sep 13 00:54:55.531388 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 13 00:54:55.531471 kernel: audit: type=1130 audit(1757724895.520:1733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.43:22-10.200.16.10:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:55.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.43:22-10.200.16.10:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:56.097000 audit[6587]: USER_ACCT pid=6587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.101585 sshd[6587]: Accepted publickey for core from 10.200.16.10 port 35398 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:56.121000 audit[6587]: CRED_ACQ pid=6587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.123626 sshd[6587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:56.129593 systemd[1]: Started session-27.scope. Sep 13 00:54:56.131003 systemd-logind[1426]: New session 27 of user core. Sep 13 00:54:56.142142 kernel: audit: type=1101 audit(1757724896.097:1734): pid=6587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.142263 kernel: audit: type=1103 audit(1757724896.121:1735): pid=6587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.122000 audit[6587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39060c30 a2=3 a3=0 items=0 ppid=1 pid=6587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:56.175942 kernel: audit: type=1006 audit(1757724896.122:1736): pid=6587 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Sep 13 00:54:56.176052 kernel: audit: type=1300 audit(1757724896.122:1736): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39060c30 a2=3 a3=0 items=0 ppid=1 pid=6587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:56.122000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:56.135000 audit[6587]: USER_START pid=6587 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.202828 kernel: audit: type=1327 audit(1757724896.122:1736): proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:56.202911 kernel: audit: type=1105 audit(1757724896.135:1737): pid=6587 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.137000 audit[6589]: CRED_ACQ pid=6589 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.222116 kernel: audit: type=1103 audit(1757724896.137:1738): pid=6589 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.587575 sshd[6587]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:56.587000 audit[6587]: USER_END pid=6587 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.593117 systemd-logind[1426]: Session 27 logged out. Waiting for processes to exit. Sep 13 00:54:56.596398 systemd[1]: sshd@24-10.200.4.43:22-10.200.16.10:35398.service: Deactivated successfully. Sep 13 00:54:56.597036 systemd[1]: session-27.scope: Deactivated successfully. Sep 13 00:54:56.598259 systemd-logind[1426]: Removed session 27. Sep 13 00:54:56.587000 audit[6587]: CRED_DISP pid=6587 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.651791 kernel: audit: type=1106 audit(1757724896.587:1739): pid=6587 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.651891 kernel: audit: type=1104 audit(1757724896.587:1740): pid=6587 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:56.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.43:22-10.200.16.10:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.43:22-10.200.16.10:44898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.685259 systemd[1]: Started sshd@25-10.200.4.43:22-10.200.16.10:44898.service. Sep 13 00:55:01.691860 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:55:01.691952 kernel: audit: type=1130 audit(1757724901.684:1742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.43:22-10.200.16.10:44898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:02.264000 audit[6599]: USER_ACCT pid=6599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.265936 sshd[6599]: Accepted publickey for core from 10.200.16.10 port 44898 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:02.288117 kernel: audit: type=1101 audit(1757724902.264:1743): pid=6599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.288080 sshd[6599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:02.286000 audit[6599]: CRED_ACQ pid=6599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.301442 systemd[1]: Started session-28.scope. Sep 13 00:55:02.302735 systemd-logind[1426]: New session 28 of user core. Sep 13 00:55:02.311499 kernel: audit: type=1103 audit(1757724902.286:1744): pid=6599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.311574 kernel: audit: type=1006 audit(1757724902.286:1745): pid=6599 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Sep 13 00:55:02.286000 audit[6599]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe16ec9dc0 a2=3 a3=0 items=0 ppid=1 pid=6599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:02.341254 kernel: audit: type=1300 audit(1757724902.286:1745): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe16ec9dc0 a2=3 a3=0 items=0 ppid=1 pid=6599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:02.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:02.309000 audit[6599]: USER_START pid=6599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.369036 kernel: audit: type=1327 audit(1757724902.286:1745): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:02.369469 kernel: audit: type=1105 audit(1757724902.309:1746): pid=6599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.369526 kernel: audit: type=1103 audit(1757724902.322:1747): pid=6601 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.322000 audit[6601]: CRED_ACQ pid=6601 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.752944 sshd[6599]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:02.753000 audit[6599]: USER_END pid=6599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.755980 systemd[1]: sshd@25-10.200.4.43:22-10.200.16.10:44898.service: Deactivated successfully. Sep 13 00:55:02.756858 systemd[1]: session-28.scope: Deactivated successfully. Sep 13 00:55:02.760911 systemd-logind[1426]: Session 28 logged out. Waiting for processes to exit. Sep 13 00:55:02.761908 systemd-logind[1426]: Removed session 28. Sep 13 00:55:02.753000 audit[6599]: CRED_DISP pid=6599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.791900 kernel: audit: type=1106 audit(1757724902.753:1748): pid=6599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.791981 kernel: audit: type=1104 audit(1757724902.753:1749): pid=6599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.43:22-10.200.16.10:44898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:05.599187 systemd[1]: run-containerd-runc-k8s.io-104e47a89fd748c81cfa5038b8a282b0eb2b746a2c501a6c44d8477cec996647-runc.TxW8qY.mount: Deactivated successfully. Sep 13 00:55:07.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.43:22-10.200.16.10:44914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:07.851341 systemd[1]: Started sshd@26-10.200.4.43:22-10.200.16.10:44914.service. Sep 13 00:55:07.856567 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:55:07.856658 kernel: audit: type=1130 audit(1757724907.850:1751): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.43:22-10.200.16.10:44914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:08.432000 audit[6634]: USER_ACCT pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.434956 sshd[6634]: Accepted publickey for core from 10.200.16.10 port 44914 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:08.454000 audit[6634]: CRED_ACQ pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.456167 sshd[6634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:08.461408 systemd-logind[1426]: New session 29 of user core. Sep 13 00:55:08.463785 systemd[1]: Started session-29.scope. Sep 13 00:55:08.477471 kernel: audit: type=1101 audit(1757724908.432:1752): pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.477549 kernel: audit: type=1103 audit(1757724908.454:1753): pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.477584 kernel: audit: type=1006 audit(1757724908.454:1754): pid=6634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Sep 13 00:55:08.454000 audit[6634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3cb11fe0 a2=3 a3=0 items=0 ppid=1 pid=6634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.507994 kernel: audit: type=1300 audit(1757724908.454:1754): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3cb11fe0 a2=3 a3=0 items=0 ppid=1 pid=6634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.508512 kernel: audit: type=1327 audit(1757724908.454:1754): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:08.454000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:08.465000 audit[6634]: USER_START pid=6634 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.536230 kernel: audit: type=1105 audit(1757724908.465:1755): pid=6634 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.554271 kernel: audit: type=1103 audit(1757724908.476:1756): pid=6636 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.476000 audit[6636]: CRED_ACQ pid=6636 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.927573 sshd[6634]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:08.927000 audit[6634]: USER_END pid=6634 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.930494 systemd[1]: sshd@26-10.200.4.43:22-10.200.16.10:44914.service: Deactivated successfully. Sep 13 00:55:08.931256 systemd[1]: session-29.scope: Deactivated successfully. Sep 13 00:55:08.932820 systemd-logind[1426]: Session 29 logged out. Waiting for processes to exit. Sep 13 00:55:08.933761 systemd-logind[1426]: Removed session 29. Sep 13 00:55:08.952112 kernel: audit: type=1106 audit(1757724908.927:1757): pid=6634 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.952194 kernel: audit: type=1104 audit(1757724908.928:1758): pid=6634 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.928000 audit[6634]: CRED_DISP pid=6634 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.43:22-10.200.16.10:44914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:13.293000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.300177 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:55:13.300262 kernel: audit: type=1400 audit(1757724913.293:1761): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.293000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.352263 kernel: audit: type=1400 audit(1757724913.293:1760): avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.293000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030b4040 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:13.376031 kernel: audit: type=1300 audit(1757724913.293:1760): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030b4040 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:13.376156 kernel: audit: type=1327 audit(1757724913.293:1760): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:13.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:13.293000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030ceb70 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:13.439475 kernel: audit: type=1300 audit(1757724913.293:1761): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030ceb70 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:13.443125 kernel: audit: type=1327 audit(1757724913.293:1761): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:13.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:13.596000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.629114 kernel: audit: type=1400 audit(1757724913.596:1762): avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.596000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7411 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.596000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fefa6f0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.666132 kernel: audit: type=1400 audit(1757724913.596:1763): avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7411 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.666200 kernel: audit: type=1300 audit(1757724913.596:1762): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fefa6f0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:13.727431 kernel: audit: type=1327 audit(1757724913.596:1762): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:13.597000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.597000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f28a260 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:13.596000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00eba5560 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:13.617000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.617000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c010985c00 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.617000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:13.617000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7417 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.617000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fefb980 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.617000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:13.617000 audit[2258]: AVC avc: denied { watch } for pid=2258 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7415 scontext=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:13.617000 audit[2258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fefb9b0 a2=fc6 a3=0 items=0 ppid=2119 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c668,c741 key=(null) Sep 13 00:55:13.617000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:14.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.4.43:22-10.200.16.10:35990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:14.026141 systemd[1]: Started sshd@27-10.200.4.43:22-10.200.16.10:35990.service. Sep 13 00:55:14.605000 audit[6647]: USER_ACCT pid=6647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.607268 sshd[6647]: Accepted publickey for core from 10.200.16.10 port 35990 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:14.607000 audit[6647]: CRED_ACQ pid=6647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.607000 audit[6647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc6805f50 a2=3 a3=0 items=0 ppid=1 pid=6647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:14.607000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:14.608486 sshd[6647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:14.612811 systemd-logind[1426]: New session 30 of user core. Sep 13 00:55:14.613416 systemd[1]: Started session-30.scope. Sep 13 00:55:14.617000 audit[6647]: USER_START pid=6647 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.618000 audit[6649]: CRED_ACQ pid=6649 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.089568 sshd[6647]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:15.089000 audit[6647]: USER_END pid=6647 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.090000 audit[6647]: CRED_DISP pid=6647 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.094055 systemd[1]: sshd@27-10.200.4.43:22-10.200.16.10:35990.service: Deactivated successfully. Sep 13 00:55:15.094883 systemd[1]: session-30.scope: Deactivated successfully. Sep 13 00:55:15.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.4.43:22-10.200.16.10:35990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:15.095811 systemd-logind[1426]: Session 30 logged out. Waiting for processes to exit. Sep 13 00:55:15.096679 systemd-logind[1426]: Removed session 30. Sep 13 00:55:17.507000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:17.507000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:17.507000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030b4180 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:17.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:17.507000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003285ee0 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:17.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:17.507000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:17.507000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030b4340 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:17.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:17.507000 audit[2307]: AVC avc: denied { watch } for pid=2307 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:17.507000 audit[2307]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030b4360 a2=fc6 a3=0 items=0 ppid=2137 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c977 key=(null) Sep 13 00:55:17.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:18.937921 systemd[1]: run-containerd-runc-k8s.io-592902947d1560a31a784d3912d6d087285e97ea8615ce1ca5c8858fc18b6d65-runc.8Ashz8.mount: Deactivated successfully. Sep 13 00:55:19.919254 systemd[1]: run-containerd-runc-k8s.io-5a1cf242527b8e6013eb9a0d944b28ff83d5382223413d5745610a321fcc64b7-runc.wiwCcz.mount: Deactivated successfully. Sep 13 00:55:20.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.4.43:22-10.200.16.10:40176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.193057 systemd[1]: Started sshd@28-10.200.4.43:22-10.200.16.10:40176.service. Sep 13 00:55:20.198683 kernel: kauditd_printk_skb: 37 callbacks suppressed Sep 13 00:55:20.199021 kernel: audit: type=1130 audit(1757724920.192:1781): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.4.43:22-10.200.16.10:40176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.955000 audit[6699]: USER_ACCT pid=6699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.955389 sshd[6699]: Accepted publickey for core from 10.200.16.10 port 40176 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:20.957388 sshd[6699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:20.955000 audit[6699]: CRED_ACQ pid=6699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.985218 systemd[1]: Started session-31.scope. Sep 13 00:55:20.986616 systemd-logind[1426]: New session 31 of user core. Sep 13 00:55:20.996015 kernel: audit: type=1101 audit(1757724920.955:1782): pid=6699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.996149 kernel: audit: type=1103 audit(1757724920.955:1783): pid=6699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.996192 kernel: audit: type=1006 audit(1757724920.955:1784): pid=6699 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Sep 13 00:55:20.955000 audit[6699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb402cd60 a2=3 a3=0 items=0 ppid=1 pid=6699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:21.027002 kernel: audit: type=1300 audit(1757724920.955:1784): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb402cd60 a2=3 a3=0 items=0 ppid=1 pid=6699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:20.955000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:20.991000 audit[6699]: USER_START pid=6699 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.055447 kernel: audit: type=1327 audit(1757724920.955:1784): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:21.055833 kernel: audit: type=1105 audit(1757724920.991:1785): pid=6699 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.055871 kernel: audit: type=1103 audit(1757724920.991:1786): pid=6701 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.991000 audit[6701]: CRED_ACQ pid=6701 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.448246 sshd[6699]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:21.449000 audit[6699]: USER_END pid=6699 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.451594 systemd[1]: sshd@28-10.200.4.43:22-10.200.16.10:40176.service: Deactivated successfully. Sep 13 00:55:21.452411 systemd[1]: session-31.scope: Deactivated successfully. Sep 13 00:55:21.454322 systemd-logind[1426]: Session 31 logged out. Waiting for processes to exit. Sep 13 00:55:21.455401 systemd-logind[1426]: Removed session 31. Sep 13 00:55:21.472109 kernel: audit: type=1106 audit(1757724921.449:1787): pid=6699 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.472174 kernel: audit: type=1104 audit(1757724921.449:1788): pid=6699 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.449000 audit[6699]: CRED_DISP pid=6699 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.4.43:22-10.200.16.10:40176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'