Sep 13 00:53:56.994254 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:53:56.994297 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:53:56.994310 kernel: BIOS-provided physical RAM map: Sep 13 00:53:56.994319 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:53:56.994327 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 13 00:53:56.994336 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 13 00:53:56.994349 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Sep 13 00:53:56.994358 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Sep 13 00:53:56.994367 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 13 00:53:56.994376 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 13 00:53:56.994385 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 13 00:53:56.994394 kernel: printk: bootconsole [earlyser0] enabled Sep 13 00:53:56.994403 kernel: NX (Execute Disable) protection: active Sep 13 00:53:56.994412 kernel: efi: EFI v2.70 by Microsoft Sep 13 00:53:56.994426 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Sep 13 00:53:56.994436 kernel: random: crng init done Sep 13 00:53:56.994446 kernel: SMBIOS 3.1.0 present. Sep 13 00:53:56.994456 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 08/23/2024 Sep 13 00:53:56.994466 kernel: Hypervisor detected: Microsoft Hyper-V Sep 13 00:53:56.994476 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 13 00:53:56.994485 kernel: Hyper-V Host Build:20348-10.0-3-0.3115 Sep 13 00:53:56.994495 kernel: Hyper-V: Nested features: 0x1e0101 Sep 13 00:53:56.994506 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 13 00:53:56.994515 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 13 00:53:56.994525 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 13 00:53:56.994535 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 13 00:53:56.994547 kernel: tsc: Detected 2793.436 MHz processor Sep 13 00:53:56.994558 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:53:56.994567 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:53:56.994578 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 13 00:53:56.994588 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:53:56.994598 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 13 00:53:56.994610 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 13 00:53:56.994620 kernel: Using GB pages for direct mapping Sep 13 00:53:56.994630 kernel: Secure boot disabled Sep 13 00:53:56.994641 kernel: ACPI: Early table checksum verification disabled Sep 13 00:53:56.994652 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 13 00:53:56.994662 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994673 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994686 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Sep 13 00:53:56.994705 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 13 00:53:56.994718 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994730 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994743 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994755 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994768 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994793 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994803 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:56.994813 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 13 00:53:56.994825 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Sep 13 00:53:56.994836 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 13 00:53:56.994848 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 13 00:53:56.994860 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 13 00:53:56.994872 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 13 00:53:56.994887 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 13 00:53:56.994898 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 13 00:53:56.994910 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 13 00:53:56.994922 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Sep 13 00:53:56.994933 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:53:56.994946 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:53:56.994957 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 13 00:53:56.994970 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 13 00:53:56.994982 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 13 00:53:56.994996 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 13 00:53:56.995009 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 13 00:53:56.995021 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 13 00:53:56.995033 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 13 00:53:56.995046 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 13 00:53:56.995057 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 13 00:53:56.995070 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 13 00:53:56.995082 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 13 00:53:56.995094 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 13 00:53:56.995109 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 13 00:53:56.995121 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 13 00:53:56.995133 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 13 00:53:56.995145 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 13 00:53:56.995157 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 13 00:53:56.995169 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Sep 13 00:53:56.995181 kernel: Zone ranges: Sep 13 00:53:56.995193 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:53:56.995205 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 13 00:53:56.995219 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:53:56.995231 kernel: Movable zone start for each node Sep 13 00:53:56.995243 kernel: Early memory node ranges Sep 13 00:53:56.995255 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 13 00:53:56.995268 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 13 00:53:56.995279 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 13 00:53:56.995291 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:53:56.995303 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 13 00:53:56.995315 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:53:56.995330 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 13 00:53:56.995342 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Sep 13 00:53:56.995354 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 13 00:53:56.995366 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 13 00:53:56.995378 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:53:56.995390 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:53:56.995402 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:53:56.995415 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 13 00:53:56.995427 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:53:56.995441 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 13 00:53:56.995453 kernel: Booting paravirtualized kernel on Hyper-V Sep 13 00:53:56.995466 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:53:56.995478 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:53:56.995491 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:53:56.995502 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:53:56.995514 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:53:56.995526 kernel: Hyper-V: PV spinlocks enabled Sep 13 00:53:56.995538 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:53:56.995552 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Sep 13 00:53:56.995564 kernel: Policy zone: Normal Sep 13 00:53:56.995579 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:53:56.995593 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:53:56.995605 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 13 00:53:56.995617 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:53:56.995629 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:53:56.995641 kernel: Memory: 8079144K/8387460K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 308056K reserved, 0K cma-reserved) Sep 13 00:53:56.995656 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:53:56.995669 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:53:56.995690 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:53:56.995704 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:53:56.995718 kernel: rcu: RCU event tracing is enabled. Sep 13 00:53:56.995730 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:53:56.995743 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:53:56.995756 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:53:56.995769 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:53:56.995780 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:53:56.995803 kernel: Using NULL legacy PIC Sep 13 00:53:56.995817 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 13 00:53:56.995829 kernel: Console: colour dummy device 80x25 Sep 13 00:53:56.995841 kernel: printk: console [tty1] enabled Sep 13 00:53:56.995853 kernel: printk: console [ttyS0] enabled Sep 13 00:53:56.995865 kernel: printk: bootconsole [earlyser0] disabled Sep 13 00:53:56.995879 kernel: ACPI: Core revision 20210730 Sep 13 00:53:56.995890 kernel: Failed to register legacy timer interrupt Sep 13 00:53:56.995902 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:53:56.995913 kernel: Hyper-V: Using IPI hypercalls Sep 13 00:53:56.995925 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5586.87 BogoMIPS (lpj=2793436) Sep 13 00:53:56.995937 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 13 00:53:56.995949 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 13 00:53:56.995960 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 13 00:53:56.995972 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:53:56.995983 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:53:56.995997 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:53:56.996009 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 13 00:53:56.996021 kernel: RETBleed: Vulnerable Sep 13 00:53:56.996033 kernel: Speculative Store Bypass: Vulnerable Sep 13 00:53:56.996045 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:53:56.996057 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:53:56.996069 kernel: active return thunk: its_return_thunk Sep 13 00:53:56.996080 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:53:56.996092 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:53:56.996105 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:53:56.996119 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:53:56.996131 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 13 00:53:56.996143 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 13 00:53:56.996155 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 13 00:53:56.996167 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:53:56.996179 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 13 00:53:56.996191 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 13 00:53:56.996203 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 13 00:53:56.996215 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 13 00:53:56.996227 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:53:56.996239 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:53:56.996250 kernel: LSM: Security Framework initializing Sep 13 00:53:56.996263 kernel: SELinux: Initializing. Sep 13 00:53:56.996275 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:53:56.996286 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:53:56.996297 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8370C CPU @ 2.80GHz (family: 0x6, model: 0x6a, stepping: 0x6) Sep 13 00:53:56.996308 kernel: Performance Events: unsupported p6 CPU model 106 no PMU driver, software events only. Sep 13 00:53:56.996319 kernel: signal: max sigframe size: 3632 Sep 13 00:53:56.996331 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:53:56.996342 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:53:56.996353 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:53:56.996365 kernel: x86: Booting SMP configuration: Sep 13 00:53:56.996379 kernel: .... node #0, CPUs: #1 Sep 13 00:53:56.996392 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 13 00:53:56.996405 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:53:56.996416 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:53:56.996428 kernel: smpboot: Max logical packages: 1 Sep 13 00:53:56.996439 kernel: smpboot: Total of 2 processors activated (11173.74 BogoMIPS) Sep 13 00:53:56.996450 kernel: devtmpfs: initialized Sep 13 00:53:56.996462 kernel: x86/mm: Memory block size: 128MB Sep 13 00:53:56.996476 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 13 00:53:56.996488 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:53:56.996499 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:53:56.996510 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:53:56.996522 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:53:56.996533 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:53:56.996545 kernel: audit: type=2000 audit(1757724835.023:1): state=initialized audit_enabled=0 res=1 Sep 13 00:53:56.996557 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:53:56.996568 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:53:56.996582 kernel: cpuidle: using governor menu Sep 13 00:53:56.996593 kernel: ACPI: bus type PCI registered Sep 13 00:53:56.996604 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:53:56.996616 kernel: dca service started, version 1.12.1 Sep 13 00:53:56.996627 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:53:56.996638 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:53:56.996650 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:53:56.996662 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:53:56.996674 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:53:56.996688 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:53:56.996699 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:53:56.996711 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:53:56.996723 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:53:56.996735 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:53:56.996746 kernel: ACPI: Interpreter enabled Sep 13 00:53:56.996758 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:53:56.996770 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:53:56.996792 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:53:56.996806 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 13 00:53:56.996816 kernel: iommu: Default domain type: Translated Sep 13 00:53:56.996828 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:53:56.996840 kernel: vgaarb: loaded Sep 13 00:53:56.996852 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:53:56.996864 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:53:56.996876 kernel: PTP clock support registered Sep 13 00:53:56.996887 kernel: Registered efivars operations Sep 13 00:53:56.996899 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:53:56.996911 kernel: PCI: System does not support PCI Sep 13 00:53:56.996924 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 13 00:53:56.996936 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:53:56.996948 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:53:56.996960 kernel: pnp: PnP ACPI init Sep 13 00:53:56.996972 kernel: pnp: PnP ACPI: found 3 devices Sep 13 00:53:56.996984 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:53:56.996996 kernel: NET: Registered PF_INET protocol family Sep 13 00:53:56.997008 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:53:56.997020 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 13 00:53:56.997034 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:53:56.997046 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:53:56.997058 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 13 00:53:56.997070 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 13 00:53:56.997082 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:53:56.997094 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:53:56.997106 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:53:56.997117 kernel: NET: Registered PF_XDP protocol family Sep 13 00:53:56.997131 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:53:56.997143 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 13 00:53:56.997155 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Sep 13 00:53:56.997167 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:53:56.997179 kernel: Initialise system trusted keyrings Sep 13 00:53:56.997191 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 13 00:53:56.997203 kernel: Key type asymmetric registered Sep 13 00:53:56.997214 kernel: Asymmetric key parser 'x509' registered Sep 13 00:53:56.997226 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:53:56.997240 kernel: io scheduler mq-deadline registered Sep 13 00:53:56.997252 kernel: io scheduler kyber registered Sep 13 00:53:56.997264 kernel: io scheduler bfq registered Sep 13 00:53:56.997276 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:53:56.997288 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:53:56.997300 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:53:56.997312 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 13 00:53:56.997324 kernel: i8042: PNP: No PS/2 controller found. Sep 13 00:53:56.997501 kernel: rtc_cmos 00:02: registered as rtc0 Sep 13 00:53:56.997617 kernel: rtc_cmos 00:02: setting system clock to 2025-09-13T00:53:56 UTC (1757724836) Sep 13 00:53:56.997721 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 13 00:53:56.997736 kernel: intel_pstate: CPU model not supported Sep 13 00:53:56.997748 kernel: efifb: probing for efifb Sep 13 00:53:56.997760 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 00:53:56.997773 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 00:53:56.997799 kernel: efifb: scrolling: redraw Sep 13 00:53:56.997811 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 00:53:56.997827 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:53:56.997839 kernel: fb0: EFI VGA frame buffer device Sep 13 00:53:56.997851 kernel: pstore: Registered efi as persistent store backend Sep 13 00:53:56.997862 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:53:56.997874 kernel: Segment Routing with IPv6 Sep 13 00:53:56.997886 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:53:56.997898 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:53:56.997910 kernel: Key type dns_resolver registered Sep 13 00:53:56.997922 kernel: IPI shorthand broadcast: enabled Sep 13 00:53:56.997936 kernel: sched_clock: Marking stable (717307600, 22323200)->(927468700, -187837900) Sep 13 00:53:56.997948 kernel: registered taskstats version 1 Sep 13 00:53:56.997960 kernel: Loading compiled-in X.509 certificates Sep 13 00:53:56.997972 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:53:56.997985 kernel: Key type .fscrypt registered Sep 13 00:53:56.997996 kernel: Key type fscrypt-provisioning registered Sep 13 00:53:56.998009 kernel: pstore: Using crash dump compression: deflate Sep 13 00:53:56.998021 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:53:56.998033 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:53:56.998047 kernel: ima: No architecture policies found Sep 13 00:53:56.998059 kernel: clk: Disabling unused clocks Sep 13 00:53:56.998071 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:53:56.998082 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:53:56.998092 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:53:56.998103 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:53:56.998114 kernel: Run /init as init process Sep 13 00:53:56.998126 kernel: with arguments: Sep 13 00:53:56.998138 kernel: /init Sep 13 00:53:56.998150 kernel: with environment: Sep 13 00:53:56.998161 kernel: HOME=/ Sep 13 00:53:56.998171 kernel: TERM=linux Sep 13 00:53:56.998184 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:53:56.998198 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:53:56.998213 systemd[1]: Detected virtualization microsoft. Sep 13 00:53:56.998226 systemd[1]: Detected architecture x86-64. Sep 13 00:53:56.998237 systemd[1]: Running in initrd. Sep 13 00:53:56.998251 systemd[1]: No hostname configured, using default hostname. Sep 13 00:53:56.998263 systemd[1]: Hostname set to . Sep 13 00:53:56.998276 systemd[1]: Initializing machine ID from random generator. Sep 13 00:53:56.998288 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:53:56.998301 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:53:56.998313 systemd[1]: Reached target cryptsetup.target. Sep 13 00:53:56.998326 systemd[1]: Reached target paths.target. Sep 13 00:53:56.998338 systemd[1]: Reached target slices.target. Sep 13 00:53:56.998353 systemd[1]: Reached target swap.target. Sep 13 00:53:56.998364 systemd[1]: Reached target timers.target. Sep 13 00:53:56.998378 systemd[1]: Listening on iscsid.socket. Sep 13 00:53:56.998390 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:53:56.998402 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:53:56.998415 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:53:56.998427 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:53:56.998441 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:53:56.998453 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:53:56.998466 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:53:56.998479 systemd[1]: Reached target sockets.target. Sep 13 00:53:56.998491 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:53:56.998504 systemd[1]: Finished network-cleanup.service. Sep 13 00:53:56.998517 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:53:56.998530 systemd[1]: Starting systemd-journald.service... Sep 13 00:53:56.998543 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:53:56.998557 systemd[1]: Starting systemd-resolved.service... Sep 13 00:53:56.998570 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:53:56.998588 systemd-journald[183]: Journal started Sep 13 00:53:56.998648 systemd-journald[183]: Runtime Journal (/run/log/journal/8117d13400a14526a3f78637a0f1ae45) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:53:57.008162 systemd[1]: Started systemd-journald.service. Sep 13 00:53:57.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.008695 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:53:57.035363 kernel: audit: type=1130 audit(1757724837.007:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.010920 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:53:57.013151 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:53:57.016354 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:53:57.018203 systemd-modules-load[184]: Inserted module 'overlay' Sep 13 00:53:57.041706 systemd-resolved[185]: Positive Trust Anchors: Sep 13 00:53:57.041722 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:53:57.099326 kernel: audit: type=1130 audit(1757724837.009:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.099355 kernel: audit: type=1130 audit(1757724837.012:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.041757 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:53:57.135058 kernel: audit: type=1130 audit(1757724837.014:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.135083 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:53:57.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.135182 dracut-cmdline[200]: dracut-dracut-053 Sep 13 00:53:57.135182 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Sep 13 00:53:57.135182 dracut-cmdline[200]: BEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:53:57.170346 kernel: audit: type=1130 audit(1757724837.063:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.170375 kernel: Bridge firewalling registered Sep 13 00:53:57.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.046214 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 13 00:53:57.047453 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:53:57.061065 systemd[1]: Started systemd-resolved.service. Sep 13 00:53:57.064272 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:53:57.083283 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:53:57.085485 systemd[1]: Reached target nss-lookup.target. Sep 13 00:53:57.088314 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:53:57.170131 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 13 00:53:57.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.211923 kernel: audit: type=1130 audit(1757724837.082:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.211974 kernel: audit: type=1130 audit(1757724837.084:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.216367 kernel: SCSI subsystem initialized Sep 13 00:53:57.244716 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:53:57.244796 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:53:57.250800 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:53:57.254447 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 13 00:53:57.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.257597 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:53:57.279547 kernel: audit: type=1130 audit(1757724837.258:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.279576 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:53:57.260515 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:53:57.281900 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:53:57.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.298801 kernel: audit: type=1130 audit(1757724837.283:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.311811 kernel: iscsi: registered transport (tcp) Sep 13 00:53:57.339427 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:53:57.339475 kernel: QLogic iSCSI HBA Driver Sep 13 00:53:57.367282 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:53:57.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.370142 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:53:57.421811 kernel: raid6: avx512x4 gen() 41289 MB/s Sep 13 00:53:57.441795 kernel: raid6: avx512x4 xor() 9571 MB/s Sep 13 00:53:57.461794 kernel: raid6: avx512x2 gen() 40725 MB/s Sep 13 00:53:57.481797 kernel: raid6: avx512x2 xor() 27012 MB/s Sep 13 00:53:57.501796 kernel: raid6: avx512x1 gen() 41263 MB/s Sep 13 00:53:57.521796 kernel: raid6: avx512x1 xor() 24837 MB/s Sep 13 00:53:57.541796 kernel: raid6: avx2x4 gen() 34325 MB/s Sep 13 00:53:57.561796 kernel: raid6: avx2x4 xor() 9799 MB/s Sep 13 00:53:57.581796 kernel: raid6: avx2x2 gen() 33993 MB/s Sep 13 00:53:57.601797 kernel: raid6: avx2x2 xor() 21556 MB/s Sep 13 00:53:57.621797 kernel: raid6: avx2x1 gen() 27087 MB/s Sep 13 00:53:57.641797 kernel: raid6: avx2x1 xor() 17306 MB/s Sep 13 00:53:57.661811 kernel: raid6: sse2x4 gen() 10252 MB/s Sep 13 00:53:57.680805 kernel: raid6: sse2x4 xor() 5950 MB/s Sep 13 00:53:57.700795 kernel: raid6: sse2x2 gen() 9938 MB/s Sep 13 00:53:57.720797 kernel: raid6: sse2x2 xor() 6617 MB/s Sep 13 00:53:57.739806 kernel: raid6: sse2x1 gen() 9228 MB/s Sep 13 00:53:57.762596 kernel: raid6: sse2x1 xor() 5304 MB/s Sep 13 00:53:57.762609 kernel: raid6: using algorithm avx512x4 gen() 41289 MB/s Sep 13 00:53:57.762618 kernel: raid6: .... xor() 9571 MB/s, rmw enabled Sep 13 00:53:57.765940 kernel: raid6: using avx512x2 recovery algorithm Sep 13 00:53:57.785806 kernel: xor: automatically using best checksumming function avx Sep 13 00:53:57.885806 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:53:57.893705 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:53:57.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.897000 audit: BPF prog-id=7 op=LOAD Sep 13 00:53:57.897000 audit: BPF prog-id=8 op=LOAD Sep 13 00:53:57.898662 systemd[1]: Starting systemd-udevd.service... Sep 13 00:53:57.911892 systemd-udevd[382]: Using default interface naming scheme 'v252'. Sep 13 00:53:57.916458 systemd[1]: Started systemd-udevd.service. Sep 13 00:53:57.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.919694 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:53:57.940380 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Sep 13 00:53:57.969523 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:53:57.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:57.974191 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:53:58.008555 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:53:58.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:58.057801 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:53:58.061890 kernel: hv_vmbus: Vmbus version:5.2 Sep 13 00:53:58.092802 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:53:58.098799 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 00:53:58.102799 kernel: AES CTR mode by8 optimization enabled Sep 13 00:53:58.102833 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 13 00:53:58.125799 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:53:58.125840 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 00:53:58.136800 kernel: scsi host1: storvsc_host_t Sep 13 00:53:58.145760 kernel: scsi host0: storvsc_host_t Sep 13 00:53:58.145969 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 00:53:58.146005 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 00:53:58.151293 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Sep 13 00:53:58.175884 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 00:53:58.175934 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 13 00:53:58.175954 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 00:53:58.195797 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 00:53:58.200728 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 00:53:58.200749 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 00:53:58.212537 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 00:53:58.238661 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 00:53:58.238866 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 00:53:58.239027 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 00:53:58.239174 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 00:53:58.239330 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:53:58.239348 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 00:53:58.275805 kernel: hv_netvsc 7ced8d9a-5267-7ced-8d9a-52677ced8d9a eth0: VF slot 1 added Sep 13 00:53:58.284799 kernel: hv_vmbus: registering driver hv_pci Sep 13 00:53:58.291817 kernel: hv_pci b9e7541d-d52c-4d94-82c2-c7cc97916988: PCI VMBus probing: Using version 0x10004 Sep 13 00:53:58.357620 kernel: hv_pci b9e7541d-d52c-4d94-82c2-c7cc97916988: PCI host bridge to bus d52c:00 Sep 13 00:53:58.357824 kernel: pci_bus d52c:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 13 00:53:58.357999 kernel: pci_bus d52c:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 00:53:58.358169 kernel: pci d52c:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 00:53:58.358337 kernel: pci d52c:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:53:58.358490 kernel: pci d52c:00:02.0: enabling Extended Tags Sep 13 00:53:58.358639 kernel: pci d52c:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at d52c:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 00:53:58.358798 kernel: pci_bus d52c:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 00:53:58.358939 kernel: pci d52c:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:53:58.371803 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (439) Sep 13 00:53:58.385380 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:53:58.409942 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:53:58.453144 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:53:58.463850 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:53:58.469139 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:53:58.476461 systemd[1]: Starting disk-uuid.service... Sep 13 00:53:58.498230 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:53:58.503989 kernel: mlx5_core d52c:00:02.0: enabling device (0000 -> 0002) Sep 13 00:53:58.766163 kernel: mlx5_core d52c:00:02.0: firmware version: 16.30.5000 Sep 13 00:53:58.766360 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:53:58.766377 kernel: mlx5_core d52c:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 00:53:58.766518 kernel: mlx5_core d52c:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 13 00:53:58.766620 kernel: mlx5_core d52c:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Sep 13 00:53:58.766715 kernel: hv_netvsc 7ced8d9a-5267-7ced-8d9a-52677ced8d9a eth0: VF registering: eth1 Sep 13 00:53:58.766855 kernel: mlx5_core d52c:00:02.0 eth1: joined to eth0 Sep 13 00:53:58.776810 kernel: mlx5_core d52c:00:02.0 enP54572s1: renamed from eth1 Sep 13 00:53:59.534353 disk-uuid[557]: The operation has completed successfully. Sep 13 00:53:59.536633 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:53:59.610003 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:53:59.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.610107 systemd[1]: Finished disk-uuid.service. Sep 13 00:53:59.620662 systemd[1]: Starting verity-setup.service... Sep 13 00:53:59.644437 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Sep 13 00:53:59.743138 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:53:59.749159 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:53:59.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.750289 systemd[1]: Finished verity-setup.service. Sep 13 00:53:59.823765 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:53:59.827108 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:53:59.825552 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:53:59.826277 systemd[1]: Starting ignition-setup.service... Sep 13 00:53:59.834440 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:53:59.859597 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:53:59.859631 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:53:59.859646 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:53:59.906628 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:53:59.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.910000 audit: BPF prog-id=9 op=LOAD Sep 13 00:53:59.912076 systemd[1]: Starting systemd-networkd.service... Sep 13 00:53:59.923762 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:53:59.939898 systemd-networkd[835]: lo: Link UP Sep 13 00:53:59.939907 systemd-networkd[835]: lo: Gained carrier Sep 13 00:53:59.943391 systemd-networkd[835]: Enumeration completed Sep 13 00:53:59.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.943482 systemd[1]: Started systemd-networkd.service. Sep 13 00:53:59.947065 systemd[1]: Reached target network.target. Sep 13 00:53:59.947657 systemd-networkd[835]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:53:59.957988 systemd[1]: Starting iscsiuio.service... Sep 13 00:53:59.966142 systemd[1]: Started iscsiuio.service. Sep 13 00:53:59.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.968853 systemd[1]: Starting iscsid.service... Sep 13 00:53:59.977518 iscsid[845]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:53:59.977518 iscsid[845]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:53:59.977518 iscsid[845]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:53:59.977518 iscsid[845]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:53:59.977518 iscsid[845]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:53:59.977518 iscsid[845]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:54:00.018586 kernel: mlx5_core d52c:00:02.0 enP54572s1: Link up Sep 13 00:54:00.018842 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:53:59.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:59.976659 systemd[1]: Finished ignition-setup.service. Sep 13 00:53:59.979504 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:53:59.982726 systemd[1]: Started iscsid.service. Sep 13 00:53:59.987855 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:54:00.025857 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:54:00.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:00.029826 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:54:00.033468 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:54:00.037155 systemd[1]: Reached target remote-fs.target. Sep 13 00:54:00.041261 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:54:00.049394 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:54:00.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:00.065264 kernel: hv_netvsc 7ced8d9a-5267-7ced-8d9a-52677ced8d9a eth0: Data path switched to VF: enP54572s1 Sep 13 00:54:00.066315 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:54:00.065613 systemd-networkd[835]: enP54572s1: Link UP Sep 13 00:54:00.065737 systemd-networkd[835]: eth0: Link UP Sep 13 00:54:00.065971 systemd-networkd[835]: eth0: Gained carrier Sep 13 00:54:00.071984 systemd-networkd[835]: enP54572s1: Gained carrier Sep 13 00:54:00.078847 systemd-networkd[835]: eth0: DHCPv4 address 10.200.4.13/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:54:00.765520 ignition[846]: Ignition 2.14.0 Sep 13 00:54:00.765533 ignition[846]: Stage: fetch-offline Sep 13 00:54:00.765600 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:00.765642 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:00.798189 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:00.801100 ignition[846]: parsed url from cmdline: "" Sep 13 00:54:00.801109 ignition[846]: no config URL provided Sep 13 00:54:00.801118 ignition[846]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:54:00.801131 ignition[846]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:54:00.801143 ignition[846]: failed to fetch config: resource requires networking Sep 13 00:54:00.805312 ignition[846]: Ignition finished successfully Sep 13 00:54:00.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:00.808245 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:54:00.812556 systemd[1]: Starting ignition-fetch.service... Sep 13 00:54:00.823753 ignition[865]: Ignition 2.14.0 Sep 13 00:54:00.823764 ignition[865]: Stage: fetch Sep 13 00:54:00.823897 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:00.823926 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:00.832300 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:00.835648 ignition[865]: parsed url from cmdline: "" Sep 13 00:54:00.835721 ignition[865]: no config URL provided Sep 13 00:54:00.835820 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:54:00.835832 ignition[865]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:54:00.835865 ignition[865]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 00:54:00.961368 ignition[865]: GET result: OK Sep 13 00:54:00.961465 ignition[865]: config has been read from IMDS userdata Sep 13 00:54:00.961501 ignition[865]: parsing config with SHA512: e7b31dbbb19fa8976dcdae8748332c22ca7061b05a981911a18aaeee6dd4fcc287aeec55cd7976fd03e322d0bea45b94fd8f0698297300738e0448c77e75e3ad Sep 13 00:54:00.968331 unknown[865]: fetched base config from "system" Sep 13 00:54:00.968342 unknown[865]: fetched base config from "system" Sep 13 00:54:00.968349 unknown[865]: fetched user config from "azure" Sep 13 00:54:00.973930 ignition[865]: fetch: fetch complete Sep 13 00:54:00.973939 ignition[865]: fetch: fetch passed Sep 13 00:54:00.973988 ignition[865]: Ignition finished successfully Sep 13 00:54:00.979817 systemd[1]: Finished ignition-fetch.service. Sep 13 00:54:00.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:00.981820 systemd[1]: Starting ignition-kargs.service... Sep 13 00:54:00.996677 ignition[871]: Ignition 2.14.0 Sep 13 00:54:00.996688 ignition[871]: Stage: kargs Sep 13 00:54:00.996828 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:00.996857 ignition[871]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:01.006443 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:01.009982 ignition[871]: kargs: kargs passed Sep 13 00:54:01.010029 ignition[871]: Ignition finished successfully Sep 13 00:54:01.014203 systemd[1]: Finished ignition-kargs.service. Sep 13 00:54:01.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.018516 systemd[1]: Starting ignition-disks.service... Sep 13 00:54:01.026225 ignition[877]: Ignition 2.14.0 Sep 13 00:54:01.026235 ignition[877]: Stage: disks Sep 13 00:54:01.026359 ignition[877]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:01.026383 ignition[877]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:01.032612 systemd[1]: Finished ignition-disks.service. Sep 13 00:54:01.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.028989 ignition[877]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:01.034847 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:54:01.031905 ignition[877]: disks: disks passed Sep 13 00:54:01.038420 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:54:01.031950 ignition[877]: Ignition finished successfully Sep 13 00:54:01.040309 systemd[1]: Reached target local-fs.target. Sep 13 00:54:01.042097 systemd[1]: Reached target sysinit.target. Sep 13 00:54:01.044426 systemd[1]: Reached target basic.target. Sep 13 00:54:01.049247 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:54:01.079207 systemd-fsck[885]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 13 00:54:01.083371 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:54:01.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.087624 systemd[1]: Mounting sysroot.mount... Sep 13 00:54:01.104810 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:54:01.104999 systemd[1]: Mounted sysroot.mount. Sep 13 00:54:01.108509 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:54:01.119268 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:54:01.124284 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 00:54:01.128305 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:54:01.129140 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:54:01.137163 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:54:01.153033 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:54:01.159123 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:54:01.172541 initrd-setup-root[900]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:54:01.181726 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (895) Sep 13 00:54:01.181753 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:54:01.181769 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:54:01.183054 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:54:01.191841 initrd-setup-root[926]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:54:01.197437 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:54:01.202450 initrd-setup-root[934]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:54:01.212014 initrd-setup-root[942]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:54:01.373007 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:54:01.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.385947 kernel: kauditd_printk_skb: 23 callbacks suppressed Sep 13 00:54:01.385993 kernel: audit: type=1130 audit(1757724841.374:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.380760 systemd[1]: Starting ignition-mount.service... Sep 13 00:54:01.394565 systemd[1]: Starting sysroot-boot.service... Sep 13 00:54:01.400406 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:54:01.403090 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:54:01.423176 systemd[1]: Finished sysroot-boot.service. Sep 13 00:54:01.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.440806 kernel: audit: type=1130 audit(1757724841.427:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.449799 ignition[965]: INFO : Ignition 2.14.0 Sep 13 00:54:01.449799 ignition[965]: INFO : Stage: mount Sep 13 00:54:01.454066 ignition[965]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:01.454066 ignition[965]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:01.463369 ignition[965]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:01.463369 ignition[965]: INFO : mount: mount passed Sep 13 00:54:01.463369 ignition[965]: INFO : Ignition finished successfully Sep 13 00:54:01.483705 kernel: audit: type=1130 audit(1757724841.465:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.459488 systemd[1]: Finished ignition-mount.service. Sep 13 00:54:01.560707 coreos-metadata[894]: Sep 13 00:54:01.560 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:54:01.567430 coreos-metadata[894]: Sep 13 00:54:01.567 INFO Fetch successful Sep 13 00:54:01.598057 coreos-metadata[894]: Sep 13 00:54:01.597 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:54:01.611693 coreos-metadata[894]: Sep 13 00:54:01.611 INFO Fetch successful Sep 13 00:54:01.616984 coreos-metadata[894]: Sep 13 00:54:01.616 INFO wrote hostname ci-3510.3.8-n-0eeb704727 to /sysroot/etc/hostname Sep 13 00:54:01.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.618775 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 00:54:01.638867 kernel: audit: type=1130 audit(1757724841.622:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:01.623775 systemd[1]: Starting ignition-files.service... Sep 13 00:54:01.642085 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:54:01.659804 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (973) Sep 13 00:54:01.668654 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:54:01.668679 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:54:01.668690 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:54:01.678298 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:54:01.689793 ignition[992]: INFO : Ignition 2.14.0 Sep 13 00:54:01.689793 ignition[992]: INFO : Stage: files Sep 13 00:54:01.693942 ignition[992]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:01.693942 ignition[992]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:01.693942 ignition[992]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:01.706031 ignition[992]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:54:01.706031 ignition[992]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:54:01.706031 ignition[992]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:54:01.720433 ignition[992]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:54:01.723903 ignition[992]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:54:01.734038 unknown[992]: wrote ssh authorized keys file for user: core Sep 13 00:54:01.736333 ignition[992]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:54:01.742978 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Sep 13 00:54:01.747517 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Sep 13 00:54:02.044481 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Sep 13 00:54:02.055040 systemd-networkd[835]: eth0: Gained IPv6LL Sep 13 00:54:02.093125 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:54:02.097930 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2012750430" Sep 13 00:54:02.152395 ignition[992]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2012750430": device or resource busy Sep 13 00:54:02.152395 ignition[992]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2012750430", trying btrfs: device or resource busy Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2012750430" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2012750430" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2012750430" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2012750430" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:54:02.152395 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem657506482" Sep 13 00:54:02.152395 ignition[992]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem657506482": device or resource busy Sep 13 00:54:02.110353 systemd[1]: mnt-oem2012750430.mount: Deactivated successfully. Sep 13 00:54:02.215621 ignition[992]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem657506482", trying btrfs: device or resource busy Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem657506482" Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem657506482" Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem657506482" Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem657506482" Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:54:02.215621 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Sep 13 00:54:02.725923 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Sep 13 00:54:02.915053 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:54:02.915053 ignition[992]: INFO : files: op(13): [started] processing unit "waagent.service" Sep 13 00:54:02.915053 ignition[992]: INFO : files: op(13): [finished] processing unit "waagent.service" Sep 13 00:54:02.915053 ignition[992]: INFO : files: op(14): [started] processing unit "nvidia.service" Sep 13 00:54:02.950672 kernel: audit: type=1130 audit(1757724842.925:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:02.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(14): [finished] processing unit "nvidia.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Sep 13 00:54:02.950900 ignition[992]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:54:02.950900 ignition[992]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:54:02.950900 ignition[992]: INFO : files: files passed Sep 13 00:54:02.950900 ignition[992]: INFO : Ignition finished successfully Sep 13 00:54:03.037293 kernel: audit: type=1130 audit(1757724842.955:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.037334 kernel: audit: type=1131 audit(1757724842.955:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.037355 kernel: audit: type=1130 audit(1757724842.982:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:02.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:02.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:02.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:02.921959 systemd[1]: Finished ignition-files.service. Sep 13 00:54:02.927674 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:54:03.041435 initrd-setup-root-after-ignition[1018]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:54:02.944231 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:54:02.945183 systemd[1]: Starting ignition-quench.service... Sep 13 00:54:02.951232 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:54:02.951336 systemd[1]: Finished ignition-quench.service. Sep 13 00:54:02.956313 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:54:02.996987 systemd[1]: Reached target ignition-complete.target. Sep 13 00:54:03.041519 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:54:03.070510 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:54:03.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.070619 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:54:03.097985 kernel: audit: type=1130 audit(1757724843.074:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.098010 kernel: audit: type=1131 audit(1757724843.074:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.075504 systemd[1]: Reached target initrd-fs.target. Sep 13 00:54:03.101641 systemd[1]: Reached target initrd.target. Sep 13 00:54:03.104815 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:54:03.108726 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:54:03.119499 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:54:03.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.124249 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:54:03.134647 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:54:03.139003 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:54:03.143199 systemd[1]: Stopped target timers.target. Sep 13 00:54:03.146508 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:54:03.146633 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:54:03.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.150641 systemd[1]: Stopped target initrd.target. Sep 13 00:54:03.153757 systemd[1]: Stopped target basic.target. Sep 13 00:54:03.157802 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:54:03.161254 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:54:03.165194 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:54:03.169026 systemd[1]: Stopped target remote-fs.target. Sep 13 00:54:03.173253 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:54:03.176724 systemd[1]: Stopped target sysinit.target. Sep 13 00:54:03.180188 systemd[1]: Stopped target local-fs.target. Sep 13 00:54:03.183398 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:54:03.187087 systemd[1]: Stopped target swap.target. Sep 13 00:54:03.190291 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:54:03.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.190460 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:54:03.193739 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:54:03.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.197379 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:54:03.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.197530 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:54:03.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.201141 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:54:03.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.201291 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:54:03.204964 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:54:03.205082 systemd[1]: Stopped ignition-files.service. Sep 13 00:54:03.209054 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 00:54:03.209171 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 00:54:03.232578 iscsid[845]: iscsid shutting down. Sep 13 00:54:03.234973 ignition[1031]: INFO : Ignition 2.14.0 Sep 13 00:54:03.234973 ignition[1031]: INFO : Stage: umount Sep 13 00:54:03.234973 ignition[1031]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:54:03.234973 ignition[1031]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:54:03.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.213752 systemd[1]: Stopping ignition-mount.service... Sep 13 00:54:03.230522 systemd[1]: Stopping iscsid.service... Sep 13 00:54:03.233590 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:54:03.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.244662 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:54:03.244854 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:54:03.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.247235 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:54:03.247366 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:54:03.280999 ignition[1031]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:54:03.251376 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:54:03.285638 ignition[1031]: INFO : umount: umount passed Sep 13 00:54:03.285638 ignition[1031]: INFO : Ignition finished successfully Sep 13 00:54:03.251489 systemd[1]: Stopped iscsid.service. Sep 13 00:54:03.255744 systemd[1]: Stopping iscsiuio.service... Sep 13 00:54:03.261507 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:54:03.261621 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:54:03.264102 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:54:03.264194 systemd[1]: Stopped iscsiuio.service. Sep 13 00:54:03.276008 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:54:03.301548 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:54:03.301655 systemd[1]: Stopped ignition-mount.service. Sep 13 00:54:03.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.305832 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:54:03.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.305881 systemd[1]: Stopped ignition-disks.service. Sep 13 00:54:03.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.309204 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:54:03.309253 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:54:03.311007 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:54:03.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.311047 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:54:03.314754 systemd[1]: Stopped target network.target. Sep 13 00:54:03.316451 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:54:03.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.316508 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:54:03.318420 systemd[1]: Stopped target paths.target. Sep 13 00:54:03.321474 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:54:03.324832 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:54:03.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.327293 systemd[1]: Stopped target slices.target. Sep 13 00:54:03.328075 systemd[1]: Stopped target sockets.target. Sep 13 00:54:03.361000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:54:03.328499 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:54:03.328555 systemd[1]: Closed iscsid.socket. Sep 13 00:54:03.329145 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:54:03.329195 systemd[1]: Closed iscsiuio.socket. Sep 13 00:54:03.329553 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:54:03.329596 systemd[1]: Stopped ignition-setup.service. Sep 13 00:54:03.330214 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:54:03.330393 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:54:03.343093 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:54:03.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.343969 systemd-networkd[835]: eth0: DHCPv6 lease lost Sep 13 00:54:03.393000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:54:03.344881 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:54:03.352403 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:54:03.352516 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:54:03.361822 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:54:03.361871 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:54:03.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.376782 systemd[1]: Stopping network-cleanup.service... Sep 13 00:54:03.380068 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:54:03.380131 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:54:03.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.384206 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:54:03.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.384258 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:54:03.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.386237 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:54:03.386282 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:54:03.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.388482 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:54:03.454075 kernel: hv_netvsc 7ced8d9a-5267-7ced-8d9a-52677ced8d9a eth0: Data path switched from VF: enP54572s1 Sep 13 00:54:03.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.391717 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:54:03.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.402454 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:54:03.402603 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:54:03.408650 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:54:03.408689 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:54:03.412369 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:54:03.412426 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:54:03.416577 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:54:03.416625 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:54:03.420155 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:54:03.420203 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:54:03.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.424648 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:54:03.424698 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:54:03.428847 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:54:03.432347 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 13 00:54:03.432411 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 13 00:54:03.434863 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:54:03.434914 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:54:03.437027 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:54:03.437088 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:54:03.448381 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 13 00:54:03.448925 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:54:03.449018 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:54:03.472247 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:54:03.472343 systemd[1]: Stopped network-cleanup.service. Sep 13 00:54:03.808458 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:54:03.808570 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:54:03.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.814401 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:54:03.818508 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:54:03.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:03.818587 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:54:03.823587 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:54:03.835238 systemd[1]: Switching root. Sep 13 00:54:03.852800 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Sep 13 00:54:03.852860 systemd-journald[183]: Journal stopped Sep 13 00:54:09.162550 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:54:09.162578 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:54:09.162591 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:54:09.162601 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:54:09.162610 kernel: SELinux: policy capability open_perms=1 Sep 13 00:54:09.162621 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:54:09.162630 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:54:09.162642 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:54:09.162653 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:54:09.162665 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:54:09.162672 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:54:09.162682 systemd[1]: Successfully loaded SELinux policy in 118.555ms. Sep 13 00:54:09.162695 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.335ms. Sep 13 00:54:09.162706 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:54:09.162719 systemd[1]: Detected virtualization microsoft. Sep 13 00:54:09.162731 systemd[1]: Detected architecture x86-64. Sep 13 00:54:09.162740 systemd[1]: Detected first boot. Sep 13 00:54:09.162752 systemd[1]: Hostname set to . Sep 13 00:54:09.162762 systemd[1]: Initializing machine ID from random generator. Sep 13 00:54:09.162776 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:54:09.162796 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:54:09.162805 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:54:09.162818 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:54:09.162828 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:54:09.162840 kernel: kauditd_printk_skb: 55 callbacks suppressed Sep 13 00:54:09.162847 kernel: audit: type=1334 audit(1757724848.681:92): prog-id=12 op=LOAD Sep 13 00:54:09.162861 kernel: audit: type=1334 audit(1757724848.681:93): prog-id=3 op=UNLOAD Sep 13 00:54:09.162868 kernel: audit: type=1334 audit(1757724848.686:94): prog-id=13 op=LOAD Sep 13 00:54:09.162880 kernel: audit: type=1334 audit(1757724848.691:95): prog-id=14 op=LOAD Sep 13 00:54:09.162888 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:54:09.162900 kernel: audit: type=1334 audit(1757724848.691:96): prog-id=4 op=UNLOAD Sep 13 00:54:09.162908 kernel: audit: type=1334 audit(1757724848.691:97): prog-id=5 op=UNLOAD Sep 13 00:54:09.162920 kernel: audit: type=1131 audit(1757724848.692:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.162930 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:54:09.162943 kernel: audit: type=1334 audit(1757724848.740:99): prog-id=12 op=UNLOAD Sep 13 00:54:09.162953 kernel: audit: type=1130 audit(1757724848.747:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.162963 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:54:09.162977 kernel: audit: type=1131 audit(1757724848.747:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.162989 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:54:09.163004 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:54:09.163020 systemd[1]: Created slice system-getty.slice. Sep 13 00:54:09.163034 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:54:09.163044 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:54:09.163055 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:54:09.163065 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:54:09.163076 systemd[1]: Created slice user.slice. Sep 13 00:54:09.163086 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:54:09.163098 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:54:09.163112 systemd[1]: Set up automount boot.automount. Sep 13 00:54:09.163126 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:54:09.163137 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:54:09.163147 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:54:09.163159 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:54:09.163171 systemd[1]: Reached target integritysetup.target. Sep 13 00:54:09.163184 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:54:09.163199 systemd[1]: Reached target remote-fs.target. Sep 13 00:54:09.163211 systemd[1]: Reached target slices.target. Sep 13 00:54:09.163228 systemd[1]: Reached target swap.target. Sep 13 00:54:09.163242 systemd[1]: Reached target torcx.target. Sep 13 00:54:09.163265 systemd[1]: Reached target veritysetup.target. Sep 13 00:54:09.163280 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:54:09.163293 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:54:09.163306 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:54:09.163324 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:54:09.163335 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:54:09.163347 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:54:09.163359 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:54:09.163369 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:54:09.163380 systemd[1]: Mounting media.mount... Sep 13 00:54:09.163390 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:09.163403 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:54:09.163415 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:54:09.163423 systemd[1]: Mounting tmp.mount... Sep 13 00:54:09.163436 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:54:09.163447 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:54:09.163457 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:54:09.163469 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:54:09.163480 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:54:09.163491 systemd[1]: Starting modprobe@drm.service... Sep 13 00:54:09.163504 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:54:09.163514 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:54:09.163526 systemd[1]: Starting modprobe@loop.service... Sep 13 00:54:09.163535 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:54:09.163548 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:54:09.163559 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:54:09.163569 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:54:09.163580 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:54:09.163590 systemd[1]: Stopped systemd-journald.service. Sep 13 00:54:09.163604 systemd[1]: Starting systemd-journald.service... Sep 13 00:54:09.163612 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:54:09.163623 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:54:09.163633 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:54:09.163645 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:54:09.163653 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:54:09.163665 systemd[1]: Stopped verity-setup.service. Sep 13 00:54:09.163677 kernel: loop: module loaded Sep 13 00:54:09.163688 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:09.163703 systemd-journald[1174]: Journal started Sep 13 00:54:09.163749 systemd-journald[1174]: Runtime Journal (/run/log/journal/3c4719e4166c49eb862db5b4dd67e2e0) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:54:04.451000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:54:04.689000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:54:04.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:54:04.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:54:04.693000 audit: BPF prog-id=10 op=LOAD Sep 13 00:54:04.693000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:54:04.693000 audit: BPF prog-id=11 op=LOAD Sep 13 00:54:04.693000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:54:05.065000 audit[1064]: AVC avc: denied { associate } for pid=1064 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:54:05.065000 audit[1064]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a4 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:05.065000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:54:05.072000 audit[1064]: AVC avc: denied { associate } for pid=1064 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:54:05.072000 audit[1064]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:05.072000 audit: CWD cwd="/" Sep 13 00:54:05.072000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:05.072000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:05.072000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:54:08.681000 audit: BPF prog-id=12 op=LOAD Sep 13 00:54:08.681000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:54:08.686000 audit: BPF prog-id=13 op=LOAD Sep 13 00:54:08.691000 audit: BPF prog-id=14 op=LOAD Sep 13 00:54:08.691000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:54:08.691000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:54:08.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:08.740000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:54:08.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:08.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.095000 audit: BPF prog-id=15 op=LOAD Sep 13 00:54:09.095000 audit: BPF prog-id=16 op=LOAD Sep 13 00:54:09.095000 audit: BPF prog-id=17 op=LOAD Sep 13 00:54:09.095000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:54:09.095000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:54:09.158000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:54:09.158000 audit[1174]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffdee94cda0 a2=4000 a3=7ffdee94ce3c items=0 ppid=1 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.158000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:54:09.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:05.042418 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:54:08.680398 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:54:05.048460 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:54:08.680410 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:54:05.048477 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:54:08.693439 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:54:05.048508 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:54:05.048517 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:54:05.048556 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:54:05.048569 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:54:05.048745 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:54:05.048800 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:54:05.048823 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:54:05.058633 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:54:05.058667 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:54:05.058684 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:54:05.058696 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:54:05.058712 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:54:05.058723 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:54:07.621306 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:07Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:54:07.621551 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:07Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:54:07.621666 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:07Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:54:07.621875 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:07Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:54:07.621921 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:07Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:54:07.621977 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2025-09-13T00:54:07Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:54:09.180300 kernel: fuse: init (API version 7.34) Sep 13 00:54:09.180363 systemd[1]: Started systemd-journald.service. Sep 13 00:54:09.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.181077 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:54:09.183201 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:54:09.185042 systemd[1]: Mounted media.mount. Sep 13 00:54:09.186865 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:54:09.188808 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:54:09.191203 systemd[1]: Mounted tmp.mount. Sep 13 00:54:09.193024 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:54:09.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.195365 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:54:09.197434 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:54:09.197575 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:54:09.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.199661 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:54:09.199810 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:54:09.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.201883 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:54:09.202014 systemd[1]: Finished modprobe@drm.service. Sep 13 00:54:09.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.204025 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:54:09.204157 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:54:09.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.206393 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:54:09.206525 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:54:09.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.208954 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:54:09.209085 systemd[1]: Finished modprobe@loop.service. Sep 13 00:54:09.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.211336 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:54:09.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.213526 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:54:09.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.215808 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:54:09.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.218342 systemd[1]: Reached target network-pre.target. Sep 13 00:54:09.221773 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:54:09.225632 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:54:09.229669 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:54:09.240314 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:54:09.243918 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:54:09.246177 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:54:09.247927 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:54:09.249958 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:54:09.251501 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:54:09.255535 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:54:09.267462 systemd-journald[1174]: Time spent on flushing to /var/log/journal/3c4719e4166c49eb862db5b4dd67e2e0 is 28.870ms for 1140 entries. Sep 13 00:54:09.267462 systemd-journald[1174]: System Journal (/var/log/journal/3c4719e4166c49eb862db5b4dd67e2e0) is 8.0M, max 2.6G, 2.6G free. Sep 13 00:54:09.404115 systemd-journald[1174]: Received client request to flush runtime journal. Sep 13 00:54:09.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.260999 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:54:09.264670 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:54:09.405393 udevadm[1188]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 00:54:09.273816 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:54:09.276189 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:54:09.301559 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:54:09.305720 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:54:09.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.407981 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:54:09.412063 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:54:09.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.547910 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:54:09.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.551306 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:54:09.745376 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:54:09.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.915932 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:54:09.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:09.918000 audit: BPF prog-id=18 op=LOAD Sep 13 00:54:09.918000 audit: BPF prog-id=19 op=LOAD Sep 13 00:54:09.918000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:54:09.918000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:54:09.920160 systemd[1]: Starting systemd-udevd.service... Sep 13 00:54:09.936247 systemd-udevd[1193]: Using default interface naming scheme 'v252'. Sep 13 00:54:10.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.241000 audit: BPF prog-id=20 op=LOAD Sep 13 00:54:10.235012 systemd[1]: Started systemd-udevd.service. Sep 13 00:54:10.243981 systemd[1]: Starting systemd-networkd.service... Sep 13 00:54:10.275608 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:54:10.282000 audit: BPF prog-id=21 op=LOAD Sep 13 00:54:10.282000 audit: BPF prog-id=22 op=LOAD Sep 13 00:54:10.282000 audit: BPF prog-id=23 op=LOAD Sep 13 00:54:10.283936 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:54:10.330821 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:54:10.346840 systemd[1]: Started systemd-userdbd.service. Sep 13 00:54:10.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.367760 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 00:54:10.367920 kernel: hv_vmbus: registering driver hv_utils Sep 13 00:54:10.379549 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 00:54:10.379632 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 00:54:10.379658 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 00:54:10.431706 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 00:54:10.443922 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 00:54:10.444014 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 00:54:10.449715 kernel: Console: switching to colour dummy device 80x25 Sep 13 00:54:10.459141 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:54:10.374000 audit[1203]: AVC avc: denied { confidentiality } for pid=1203 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:54:10.484539 kernel: hv_vmbus: registering driver hv_balloon Sep 13 00:54:10.494539 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 00:54:10.374000 audit[1203]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5566052a0e20 a1=f83c a2=7f1367a7abc5 a3=5 items=12 ppid=1193 pid=1203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:10.374000 audit: CWD cwd="/" Sep 13 00:54:10.374000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=1 name=(null) inode=14752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=2 name=(null) inode=14752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=3 name=(null) inode=14753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=4 name=(null) inode=14752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=5 name=(null) inode=14754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=6 name=(null) inode=14752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=7 name=(null) inode=14755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=8 name=(null) inode=14752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=9 name=(null) inode=14756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=10 name=(null) inode=14752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PATH item=11 name=(null) inode=14757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:10.374000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:54:10.642573 systemd-networkd[1208]: lo: Link UP Sep 13 00:54:10.642969 systemd-networkd[1208]: lo: Gained carrier Sep 13 00:54:10.643914 systemd-networkd[1208]: Enumeration completed Sep 13 00:54:10.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.644139 systemd[1]: Started systemd-networkd.service. Sep 13 00:54:10.647753 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:54:10.654766 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:54:10.668528 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 13 00:54:10.690406 systemd-networkd[1208]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:54:10.736530 kernel: mlx5_core d52c:00:02.0 enP54572s1: Link up Sep 13 00:54:10.740527 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:54:10.767253 kernel: hv_netvsc 7ced8d9a-5267-7ced-8d9a-52677ced8d9a eth0: Data path switched to VF: enP54572s1 Sep 13 00:54:10.766721 systemd-networkd[1208]: enP54572s1: Link UP Sep 13 00:54:10.766866 systemd-networkd[1208]: eth0: Link UP Sep 13 00:54:10.766871 systemd-networkd[1208]: eth0: Gained carrier Sep 13 00:54:10.771854 systemd-networkd[1208]: enP54572s1: Gained carrier Sep 13 00:54:10.776620 systemd-networkd[1208]: eth0: DHCPv4 address 10.200.4.13/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:54:10.779901 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:54:10.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.783192 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:54:10.864633 lvm[1270]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:54:10.897448 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:54:10.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.899967 systemd[1]: Reached target cryptsetup.target. Sep 13 00:54:10.903014 systemd[1]: Starting lvm2-activation.service... Sep 13 00:54:10.907353 lvm[1271]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:54:10.928433 systemd[1]: Finished lvm2-activation.service. Sep 13 00:54:10.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:10.930887 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:54:10.933044 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:54:10.933079 systemd[1]: Reached target local-fs.target. Sep 13 00:54:10.935125 systemd[1]: Reached target machines.target. Sep 13 00:54:10.938151 systemd[1]: Starting ldconfig.service... Sep 13 00:54:10.948020 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:54:10.948086 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:10.949119 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:54:10.952187 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:54:10.955603 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:54:10.959259 systemd[1]: Starting systemd-sysext.service... Sep 13 00:54:10.966159 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1273 (bootctl) Sep 13 00:54:10.967473 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:54:11.043578 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:54:11.202818 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:54:11.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.405889 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:54:11.406117 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:54:11.492539 kernel: loop0: detected capacity change from 0 to 224512 Sep 13 00:54:11.659739 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:54:11.660407 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:54:11.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.679555 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:54:11.699541 kernel: loop1: detected capacity change from 0 to 224512 Sep 13 00:54:11.712099 (sd-sysext)[1287]: Using extensions 'kubernetes'. Sep 13 00:54:11.712542 (sd-sysext)[1287]: Merged extensions into '/usr'. Sep 13 00:54:11.728357 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:11.729737 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:54:11.732063 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:54:11.734627 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:54:11.736785 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:54:11.738933 systemd[1]: Starting modprobe@loop.service... Sep 13 00:54:11.740629 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:54:11.740827 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:11.741002 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:11.745106 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:54:11.747822 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:54:11.747976 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:54:11.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.750561 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:54:11.750708 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:54:11.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.753339 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:54:11.753473 systemd[1]: Finished modprobe@loop.service. Sep 13 00:54:11.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.755947 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:54:11.756072 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:54:11.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:11.757355 systemd[1]: Finished systemd-sysext.service. Sep 13 00:54:11.759619 systemd[1]: Starting ensure-sysext.service... Sep 13 00:54:11.761778 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:54:11.773270 systemd[1]: Reloading. Sep 13 00:54:11.782490 systemd-fsck[1282]: fsck.fat 4.2 (2021-01-31) Sep 13 00:54:11.782490 systemd-fsck[1282]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:54:11.798486 systemd-tmpfiles[1294]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:54:11.806399 systemd-tmpfiles[1294]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:54:11.814395 systemd-tmpfiles[1294]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:54:11.845061 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2025-09-13T00:54:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:54:11.849822 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2025-09-13T00:54:11Z" level=info msg="torcx already run" Sep 13 00:54:11.937463 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:54:11.937483 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:54:11.954632 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:54:12.014000 audit: BPF prog-id=24 op=LOAD Sep 13 00:54:12.014000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:54:12.016000 audit: BPF prog-id=25 op=LOAD Sep 13 00:54:12.016000 audit: BPF prog-id=26 op=LOAD Sep 13 00:54:12.016000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:54:12.016000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:54:12.017000 audit: BPF prog-id=27 op=LOAD Sep 13 00:54:12.017000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:54:12.017000 audit: BPF prog-id=28 op=LOAD Sep 13 00:54:12.017000 audit: BPF prog-id=29 op=LOAD Sep 13 00:54:12.017000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:54:12.017000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:54:12.017000 audit: BPF prog-id=30 op=LOAD Sep 13 00:54:12.017000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:54:12.018000 audit: BPF prog-id=31 op=LOAD Sep 13 00:54:12.018000 audit: BPF prog-id=32 op=LOAD Sep 13 00:54:12.018000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:54:12.018000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:54:12.022536 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:54:12.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.032944 systemd[1]: Mounting boot.mount... Sep 13 00:54:12.039973 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:12.040211 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.041655 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:54:12.045715 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:54:12.049554 systemd[1]: Starting modprobe@loop.service... Sep 13 00:54:12.051257 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.051597 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:12.051862 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:12.053245 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:54:12.053407 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:54:12.056182 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:54:12.056331 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:54:12.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.060467 systemd[1]: Mounted boot.mount. Sep 13 00:54:12.062897 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:54:12.063047 systemd[1]: Finished modprobe@loop.service. Sep 13 00:54:12.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.068177 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.070017 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:54:12.073930 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:54:12.077243 systemd[1]: Starting modprobe@loop.service... Sep 13 00:54:12.079094 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.079308 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:12.080658 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:54:12.080819 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:54:12.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.083419 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:54:12.083594 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:54:12.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.086110 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:54:12.086255 systemd[1]: Finished modprobe@loop.service. Sep 13 00:54:12.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.088873 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:54:12.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.093903 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.095234 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:54:12.099059 systemd[1]: Starting modprobe@drm.service... Sep 13 00:54:12.102314 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:54:12.105601 systemd[1]: Starting modprobe@loop.service... Sep 13 00:54:12.107681 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.107894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:12.109104 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:54:12.109254 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:54:12.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.111806 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:54:12.111953 systemd[1]: Finished modprobe@drm.service. Sep 13 00:54:12.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.114438 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:54:12.114692 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:54:12.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.117366 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:54:12.117504 systemd[1]: Finished modprobe@loop.service. Sep 13 00:54:12.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.120075 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:54:12.120183 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:54:12.121361 systemd[1]: Finished ensure-sysext.service. Sep 13 00:54:12.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.404926 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:12.404956 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:54:12.600428 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:54:12.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.604114 systemd[1]: Starting audit-rules.service... Sep 13 00:54:12.606986 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:54:12.613000 audit: BPF prog-id=33 op=LOAD Sep 13 00:54:12.617000 audit: BPF prog-id=34 op=LOAD Sep 13 00:54:12.610189 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:54:12.614531 systemd[1]: Starting systemd-resolved.service... Sep 13 00:54:12.619507 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:54:12.623091 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:54:12.634231 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:54:12.636583 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:54:12.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.645000 audit[1397]: SYSTEM_BOOT pid=1397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.647890 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:54:12.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.651672 systemd-networkd[1208]: eth0: Gained IPv6LL Sep 13 00:54:12.657752 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:54:12.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.735301 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:54:12.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.737396 systemd[1]: Reached target time-set.target. Sep 13 00:54:12.740620 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:54:12.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:12.746435 systemd-resolved[1394]: Positive Trust Anchors: Sep 13 00:54:12.746451 systemd-resolved[1394]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:54:12.746494 systemd-resolved[1394]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:54:12.778925 systemd-resolved[1394]: Using system hostname 'ci-3510.3.8-n-0eeb704727'. Sep 13 00:54:12.779000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:54:12.779000 audit[1412]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa1ae7f20 a2=420 a3=0 items=0 ppid=1391 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:12.779000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:54:12.780623 augenrules[1412]: No rules Sep 13 00:54:12.781230 systemd[1]: Finished audit-rules.service. Sep 13 00:54:12.783136 systemd[1]: Started systemd-resolved.service. Sep 13 00:54:12.785184 systemd[1]: Reached target network.target. Sep 13 00:54:12.787086 systemd[1]: Reached target network-online.target. Sep 13 00:54:12.789073 systemd[1]: Reached target nss-lookup.target. Sep 13 00:54:12.924221 systemd-timesyncd[1396]: Contacted time server 51.89.151.183:123 (0.flatcar.pool.ntp.org). Sep 13 00:54:12.924330 systemd-timesyncd[1396]: Initial clock synchronization to Sat 2025-09-13 00:54:12.922494 UTC. Sep 13 00:54:13.830486 ldconfig[1272]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:54:13.840850 systemd[1]: Finished ldconfig.service. Sep 13 00:54:13.844104 systemd[1]: Starting systemd-update-done.service... Sep 13 00:54:13.852802 systemd[1]: Finished systemd-update-done.service. Sep 13 00:54:13.855165 systemd[1]: Reached target sysinit.target. Sep 13 00:54:13.857270 systemd[1]: Started motdgen.path. Sep 13 00:54:13.858830 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:54:13.861658 systemd[1]: Started logrotate.timer. Sep 13 00:54:13.863327 systemd[1]: Started mdadm.timer. Sep 13 00:54:13.864804 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:54:13.866798 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:54:13.866832 systemd[1]: Reached target paths.target. Sep 13 00:54:13.868566 systemd[1]: Reached target timers.target. Sep 13 00:54:13.871558 systemd[1]: Listening on dbus.socket. Sep 13 00:54:13.874647 systemd[1]: Starting docker.socket... Sep 13 00:54:13.885299 systemd[1]: Listening on sshd.socket. Sep 13 00:54:13.887499 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:13.887967 systemd[1]: Listening on docker.socket. Sep 13 00:54:13.889970 systemd[1]: Reached target sockets.target. Sep 13 00:54:13.891893 systemd[1]: Reached target basic.target. Sep 13 00:54:13.893818 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:54:13.893852 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:54:13.894800 systemd[1]: Starting containerd.service... Sep 13 00:54:13.897573 systemd[1]: Starting dbus.service... Sep 13 00:54:13.899942 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:54:13.902943 systemd[1]: Starting extend-filesystems.service... Sep 13 00:54:13.905111 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:54:13.923608 jq[1422]: false Sep 13 00:54:13.935747 extend-filesystems[1423]: Found loop1 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda1 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda2 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda3 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found usr Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda4 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda6 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda7 Sep 13 00:54:13.938051 extend-filesystems[1423]: Found sda9 Sep 13 00:54:13.938051 extend-filesystems[1423]: Checking size of /dev/sda9 Sep 13 00:54:13.947645 systemd[1]: Starting kubelet.service... Sep 13 00:54:13.954144 systemd[1]: Starting motdgen.service... Sep 13 00:54:13.957781 systemd[1]: Started nvidia.service. Sep 13 00:54:13.964328 systemd[1]: Starting prepare-helm.service... Sep 13 00:54:13.967306 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:54:13.970764 systemd[1]: Starting sshd-keygen.service... Sep 13 00:54:13.977658 systemd[1]: Starting systemd-logind.service... Sep 13 00:54:13.979918 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:13.979998 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:54:13.980540 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:54:13.983569 systemd[1]: Starting update-engine.service... Sep 13 00:54:13.986716 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:54:13.992110 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:54:13.993373 jq[1437]: true Sep 13 00:54:13.992340 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:54:14.009090 extend-filesystems[1423]: Old size kept for /dev/sda9 Sep 13 00:54:14.013228 extend-filesystems[1423]: Found sr0 Sep 13 00:54:14.009656 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:54:14.009829 systemd[1]: Finished extend-filesystems.service. Sep 13 00:54:14.013499 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:54:14.013670 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:54:14.051221 jq[1441]: true Sep 13 00:54:14.096300 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:54:14.096504 systemd[1]: Finished motdgen.service. Sep 13 00:54:14.133090 systemd-logind[1435]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:54:14.135600 systemd-logind[1435]: New seat seat0. Sep 13 00:54:14.151995 dbus-daemon[1421]: [system] SELinux support is enabled Sep 13 00:54:14.152171 systemd[1]: Started dbus.service. Sep 13 00:54:14.156616 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:54:14.156646 systemd[1]: Reached target system-config.target. Sep 13 00:54:14.159025 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:54:14.159051 systemd[1]: Reached target user-config.target. Sep 13 00:54:14.164036 systemd[1]: Started systemd-logind.service. Sep 13 00:54:14.167001 dbus-daemon[1421]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:54:14.177926 env[1457]: time="2025-09-13T00:54:14.177867267Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:54:14.181807 bash[1489]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:54:14.182570 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:54:14.255872 env[1457]: time="2025-09-13T00:54:14.255821978Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:54:14.256012 env[1457]: time="2025-09-13T00:54:14.255989461Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:14.262498 env[1457]: time="2025-09-13T00:54:14.262450641Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:54:14.262498 env[1457]: time="2025-09-13T00:54:14.262495536Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:14.262813 env[1457]: time="2025-09-13T00:54:14.262786208Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:54:14.262863 env[1457]: time="2025-09-13T00:54:14.262816806Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:14.262863 env[1457]: time="2025-09-13T00:54:14.262836004Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:54:14.262863 env[1457]: time="2025-09-13T00:54:14.262851302Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:14.262959 env[1457]: time="2025-09-13T00:54:14.262941394Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:14.263211 env[1457]: time="2025-09-13T00:54:14.263189670Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:14.263389 env[1457]: time="2025-09-13T00:54:14.263365353Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:54:14.263428 env[1457]: time="2025-09-13T00:54:14.263394150Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:54:14.263473 env[1457]: time="2025-09-13T00:54:14.263454844Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:54:14.263534 env[1457]: time="2025-09-13T00:54:14.263477342Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:54:14.265926 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:54:14.315866 env[1457]: time="2025-09-13T00:54:14.315816413Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:54:14.315993 env[1457]: time="2025-09-13T00:54:14.315888306Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:54:14.315993 env[1457]: time="2025-09-13T00:54:14.315908604Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:54:14.315993 env[1457]: time="2025-09-13T00:54:14.315968299Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.315993 env[1457]: time="2025-09-13T00:54:14.315987497Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316128 env[1457]: time="2025-09-13T00:54:14.316075688Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316128 env[1457]: time="2025-09-13T00:54:14.316099686Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316128 env[1457]: time="2025-09-13T00:54:14.316120484Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316229 env[1457]: time="2025-09-13T00:54:14.316154181Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316229 env[1457]: time="2025-09-13T00:54:14.316175579Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316229 env[1457]: time="2025-09-13T00:54:14.316195177Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.316229 env[1457]: time="2025-09-13T00:54:14.316214475Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:54:14.316377 env[1457]: time="2025-09-13T00:54:14.316355262Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:54:14.316503 env[1457]: time="2025-09-13T00:54:14.316483149Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:54:14.316992 env[1457]: time="2025-09-13T00:54:14.316958604Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:54:14.317052 env[1457]: time="2025-09-13T00:54:14.317016498Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317052 env[1457]: time="2025-09-13T00:54:14.317037496Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:54:14.317116 env[1457]: time="2025-09-13T00:54:14.317106789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317149 env[1457]: time="2025-09-13T00:54:14.317126787Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317224 env[1457]: time="2025-09-13T00:54:14.317145486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317260 env[1457]: time="2025-09-13T00:54:14.317234377Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317260 env[1457]: time="2025-09-13T00:54:14.317253775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317331 env[1457]: time="2025-09-13T00:54:14.317272373Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317331 env[1457]: time="2025-09-13T00:54:14.317290772Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317331 env[1457]: time="2025-09-13T00:54:14.317306470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317449 env[1457]: time="2025-09-13T00:54:14.317325868Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:54:14.317628 env[1457]: time="2025-09-13T00:54:14.317606641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317672 env[1457]: time="2025-09-13T00:54:14.317635539Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317672 env[1457]: time="2025-09-13T00:54:14.317653637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.317764 env[1457]: time="2025-09-13T00:54:14.317673935Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:54:14.317806 env[1457]: time="2025-09-13T00:54:14.317778725Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:54:14.317806 env[1457]: time="2025-09-13T00:54:14.317797723Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:54:14.317873 env[1457]: time="2025-09-13T00:54:14.317825320Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:54:14.317904 env[1457]: time="2025-09-13T00:54:14.317877315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:54:14.318312 env[1457]: time="2025-09-13T00:54:14.318230181Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.318327172Z" level=info msg="Connect containerd service" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.318395965Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.319190489Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.319468862Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.319537556Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.319590451Z" level=info msg="containerd successfully booted in 0.147191s" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.320638150Z" level=info msg="Start subscribing containerd event" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.320698344Z" level=info msg="Start recovering state" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.320791935Z" level=info msg="Start event monitor" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.320816033Z" level=info msg="Start snapshots syncer" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.320897125Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:54:14.328479 env[1457]: time="2025-09-13T00:54:14.320908924Z" level=info msg="Start streaming server" Sep 13 00:54:14.319675 systemd[1]: Started containerd.service. Sep 13 00:54:14.378014 update_engine[1436]: I0913 00:54:14.374434 1436 main.cc:92] Flatcar Update Engine starting Sep 13 00:54:14.391756 systemd[1]: Started update-engine.service. Sep 13 00:54:14.392685 update_engine[1436]: I0913 00:54:14.391808 1436 update_check_scheduler.cc:74] Next update check in 7m20s Sep 13 00:54:14.396461 systemd[1]: Started locksmithd.service. Sep 13 00:54:14.429761 tar[1440]: linux-amd64/LICENSE Sep 13 00:54:14.430063 tar[1440]: linux-amd64/helm Sep 13 00:54:15.116971 tar[1440]: linux-amd64/README.md Sep 13 00:54:15.127770 systemd[1]: Finished prepare-helm.service. Sep 13 00:54:15.329812 sshd_keygen[1448]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:54:15.357442 systemd[1]: Finished sshd-keygen.service. Sep 13 00:54:15.361325 systemd[1]: Starting issuegen.service... Sep 13 00:54:15.365404 systemd[1]: Started waagent.service. Sep 13 00:54:15.376167 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:54:15.376358 systemd[1]: Finished issuegen.service. Sep 13 00:54:15.379843 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:54:15.400224 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:54:15.411622 systemd[1]: Started getty@tty1.service. Sep 13 00:54:15.415116 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:54:15.417810 systemd[1]: Reached target getty.target. Sep 13 00:54:15.445935 locksmithd[1532]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:54:15.628915 systemd[1]: Started kubelet.service. Sep 13 00:54:15.632462 systemd[1]: Reached target multi-user.target. Sep 13 00:54:15.636218 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:54:15.644935 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:54:15.645123 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:54:15.648837 systemd[1]: Startup finished in 487ms (firmware) + 7.847s (loader) + 867ms (kernel) + 7.583s (initrd) + 11.327s (userspace) = 28.113s. Sep 13 00:54:15.817682 login[1550]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:54:15.818845 login[1552]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:54:15.909326 systemd[1]: Created slice user-500.slice. Sep 13 00:54:15.910814 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:54:15.917205 systemd-logind[1435]: New session 1 of user core. Sep 13 00:54:15.922099 systemd-logind[1435]: New session 2 of user core. Sep 13 00:54:15.929479 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:54:15.931182 systemd[1]: Starting user@500.service... Sep 13 00:54:15.943256 (systemd)[1563]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:16.156983 systemd[1563]: Queued start job for default target default.target. Sep 13 00:54:16.157598 systemd[1563]: Reached target paths.target. Sep 13 00:54:16.157624 systemd[1563]: Reached target sockets.target. Sep 13 00:54:16.157641 systemd[1563]: Reached target timers.target. Sep 13 00:54:16.157655 systemd[1563]: Reached target basic.target. Sep 13 00:54:16.157711 systemd[1563]: Reached target default.target. Sep 13 00:54:16.157749 systemd[1563]: Startup finished in 206ms. Sep 13 00:54:16.157781 systemd[1]: Started user@500.service. Sep 13 00:54:16.158936 systemd[1]: Started session-1.scope. Sep 13 00:54:16.159732 systemd[1]: Started session-2.scope. Sep 13 00:54:16.390793 kubelet[1556]: E0913 00:54:16.390753 1556 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:16.392454 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:16.392626 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:16.392865 systemd[1]: kubelet.service: Consumed 1.093s CPU time. Sep 13 00:54:18.315227 waagent[1545]: 2025-09-13T00:54:18.315117Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 00:54:18.323812 waagent[1545]: 2025-09-13T00:54:18.323735Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 00:54:18.324645 waagent[1545]: 2025-09-13T00:54:18.324588Z INFO Daemon Daemon Python: 3.9.16 Sep 13 00:54:18.325904 waagent[1545]: 2025-09-13T00:54:18.325841Z INFO Daemon Daemon Run daemon Sep 13 00:54:18.327059 waagent[1545]: 2025-09-13T00:54:18.327006Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 00:54:18.345274 waagent[1545]: 2025-09-13T00:54:18.345151Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:54:18.352013 waagent[1545]: 2025-09-13T00:54:18.351901Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.353039Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.353751Z INFO Daemon Daemon Using waagent for provisioning Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.355220Z INFO Daemon Daemon Activate resource disk Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.356210Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.364035Z INFO Daemon Daemon Found device: None Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.365594Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.366340Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.368031Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.368380Z INFO Daemon Daemon Running default provisioning handler Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.377483Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.380239Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.381191Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:54:18.392000 waagent[1545]: 2025-09-13T00:54:18.381884Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 00:54:18.436131 waagent[1545]: 2025-09-13T00:54:18.435971Z INFO Daemon Daemon Successfully mounted dvd Sep 13 00:54:18.465947 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 00:54:18.477533 waagent[1545]: 2025-09-13T00:54:18.477389Z INFO Daemon Daemon Detect protocol endpoint Sep 13 00:54:18.491286 waagent[1545]: 2025-09-13T00:54:18.478633Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:54:18.491286 waagent[1545]: 2025-09-13T00:54:18.479508Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 00:54:18.491286 waagent[1545]: 2025-09-13T00:54:18.480342Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 00:54:18.491286 waagent[1545]: 2025-09-13T00:54:18.481937Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 00:54:18.491286 waagent[1545]: 2025-09-13T00:54:18.482574Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 00:54:18.519988 waagent[1545]: 2025-09-13T00:54:18.519926Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 00:54:18.526965 waagent[1545]: 2025-09-13T00:54:18.521658Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 00:54:18.526965 waagent[1545]: 2025-09-13T00:54:18.522329Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 00:54:18.746289 waagent[1545]: 2025-09-13T00:54:18.746147Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 00:54:18.757406 waagent[1545]: 2025-09-13T00:54:18.757331Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 00:54:18.760108 waagent[1545]: 2025-09-13T00:54:18.760043Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 00:54:18.886991 waagent[1545]: 2025-09-13T00:54:18.886863Z INFO Daemon Daemon Found private key matching thumbprint EA9F5A3D306C122EDE4647020236B10D95530105 Sep 13 00:54:18.892634 waagent[1545]: 2025-09-13T00:54:18.888204Z INFO Daemon Daemon Fetch goal state completed Sep 13 00:54:18.914327 waagent[1545]: 2025-09-13T00:54:18.914264Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: ed9d44bb-3f6a-4c7d-9ee4-0d7cc4132a98 New eTag: 10700140876591311304] Sep 13 00:54:18.921302 waagent[1545]: 2025-09-13T00:54:18.915859Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:54:18.963743 waagent[1545]: 2025-09-13T00:54:18.963658Z INFO Daemon Daemon Starting provisioning Sep 13 00:54:18.969965 waagent[1545]: 2025-09-13T00:54:18.965047Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 00:54:18.969965 waagent[1545]: 2025-09-13T00:54:18.965838Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-0eeb704727] Sep 13 00:54:18.975279 waagent[1545]: 2025-09-13T00:54:18.975166Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-0eeb704727] Sep 13 00:54:18.982011 waagent[1545]: 2025-09-13T00:54:18.976553Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 00:54:18.982011 waagent[1545]: 2025-09-13T00:54:18.977794Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 00:54:18.990637 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 00:54:18.990876 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 00:54:18.990945 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 00:54:18.991258 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:54:18.995575 systemd-networkd[1208]: eth0: DHCPv6 lease lost Sep 13 00:54:18.996872 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:54:18.997037 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:54:18.999196 systemd[1]: Starting systemd-networkd.service... Sep 13 00:54:19.029816 systemd-networkd[1604]: enP54572s1: Link UP Sep 13 00:54:19.029825 systemd-networkd[1604]: enP54572s1: Gained carrier Sep 13 00:54:19.031206 systemd-networkd[1604]: eth0: Link UP Sep 13 00:54:19.031215 systemd-networkd[1604]: eth0: Gained carrier Sep 13 00:54:19.031688 systemd-networkd[1604]: lo: Link UP Sep 13 00:54:19.031696 systemd-networkd[1604]: lo: Gained carrier Sep 13 00:54:19.032015 systemd-networkd[1604]: eth0: Gained IPv6LL Sep 13 00:54:19.032282 systemd-networkd[1604]: Enumeration completed Sep 13 00:54:19.032386 systemd[1]: Started systemd-networkd.service. Sep 13 00:54:19.037379 waagent[1545]: 2025-09-13T00:54:19.033877Z INFO Daemon Daemon Create user account if not exists Sep 13 00:54:19.035333 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:54:19.038296 waagent[1545]: 2025-09-13T00:54:19.038188Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 00:54:19.041282 waagent[1545]: 2025-09-13T00:54:19.041194Z INFO Daemon Daemon Configure sudoer Sep 13 00:54:19.044388 systemd-networkd[1604]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:54:19.048402 waagent[1545]: 2025-09-13T00:54:19.048200Z INFO Daemon Daemon Configure sshd Sep 13 00:54:19.052013 waagent[1545]: 2025-09-13T00:54:19.049346Z INFO Daemon Daemon Deploy ssh public key. Sep 13 00:54:19.059579 systemd-networkd[1604]: eth0: DHCPv4 address 10.200.4.13/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:54:19.062238 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:54:20.171088 waagent[1545]: 2025-09-13T00:54:20.171014Z INFO Daemon Daemon Provisioning complete Sep 13 00:54:20.183521 waagent[1545]: 2025-09-13T00:54:20.183449Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 00:54:20.186433 waagent[1545]: 2025-09-13T00:54:20.186373Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 00:54:20.191430 waagent[1545]: 2025-09-13T00:54:20.191365Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 00:54:20.691841 waagent[1610]: 2025-09-13T00:54:20.691737Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 00:54:20.692654 waagent[1610]: 2025-09-13T00:54:20.692590Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:20.692800 waagent[1610]: 2025-09-13T00:54:20.692748Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:20.703956 waagent[1610]: 2025-09-13T00:54:20.703878Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 00:54:20.704124 waagent[1610]: 2025-09-13T00:54:20.704071Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 00:54:20.757308 waagent[1610]: 2025-09-13T00:54:20.757182Z INFO ExtHandler ExtHandler Found private key matching thumbprint EA9F5A3D306C122EDE4647020236B10D95530105 Sep 13 00:54:20.757633 waagent[1610]: 2025-09-13T00:54:20.757571Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 00:54:20.771565 waagent[1610]: 2025-09-13T00:54:20.771492Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: caf80542-3e19-4d92-bd57-efb243ca6c02 New eTag: 10700140876591311304] Sep 13 00:54:20.772069 waagent[1610]: 2025-09-13T00:54:20.772013Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:54:20.849388 waagent[1610]: 2025-09-13T00:54:20.849254Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:54:20.861432 waagent[1610]: 2025-09-13T00:54:20.861349Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1610 Sep 13 00:54:20.866346 waagent[1610]: 2025-09-13T00:54:20.866271Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:54:20.868105 waagent[1610]: 2025-09-13T00:54:20.868037Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 00:54:20.901894 waagent[1610]: 2025-09-13T00:54:20.901837Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:54:20.902249 waagent[1610]: 2025-09-13T00:54:20.902191Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:54:20.909627 waagent[1610]: 2025-09-13T00:54:20.909572Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:54:20.910086 waagent[1610]: 2025-09-13T00:54:20.910028Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:54:20.911113 waagent[1610]: 2025-09-13T00:54:20.911043Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 00:54:20.912406 waagent[1610]: 2025-09-13T00:54:20.912349Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:54:20.912875 waagent[1610]: 2025-09-13T00:54:20.912821Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:20.913029 waagent[1610]: 2025-09-13T00:54:20.912981Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:20.913529 waagent[1610]: 2025-09-13T00:54:20.913460Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:54:20.913802 waagent[1610]: 2025-09-13T00:54:20.913747Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:54:20.913802 waagent[1610]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:54:20.913802 waagent[1610]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:54:20.913802 waagent[1610]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:54:20.913802 waagent[1610]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:20.913802 waagent[1610]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:20.913802 waagent[1610]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:20.916716 waagent[1610]: 2025-09-13T00:54:20.916534Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:54:20.917379 waagent[1610]: 2025-09-13T00:54:20.917320Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:20.917576 waagent[1610]: 2025-09-13T00:54:20.917504Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:20.917787 waagent[1610]: 2025-09-13T00:54:20.917733Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:54:20.918466 waagent[1610]: 2025-09-13T00:54:20.918402Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:54:20.919175 waagent[1610]: 2025-09-13T00:54:20.919122Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:54:20.919602 waagent[1610]: 2025-09-13T00:54:20.919554Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:54:20.919739 waagent[1610]: 2025-09-13T00:54:20.919696Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:54:20.920579 waagent[1610]: 2025-09-13T00:54:20.920502Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:54:20.920943 waagent[1610]: 2025-09-13T00:54:20.920898Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:54:20.921138 waagent[1610]: 2025-09-13T00:54:20.921093Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:54:20.935914 waagent[1610]: 2025-09-13T00:54:20.935851Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 00:54:20.936839 waagent[1610]: 2025-09-13T00:54:20.936789Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:54:20.937895 waagent[1610]: 2025-09-13T00:54:20.937829Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 00:54:20.941942 waagent[1610]: 2025-09-13T00:54:20.941844Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1604' Sep 13 00:54:20.959155 waagent[1610]: 2025-09-13T00:54:20.959045Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:54:20.959155 waagent[1610]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:54:20.959155 waagent[1610]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:54:20.959155 waagent[1610]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:9a:52:67 brd ff:ff:ff:ff:ff:ff Sep 13 00:54:20.959155 waagent[1610]: 3: enP54572s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:9a:52:67 brd ff:ff:ff:ff:ff:ff\ altname enP54572p0s2 Sep 13 00:54:20.959155 waagent[1610]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:54:20.959155 waagent[1610]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:54:20.959155 waagent[1610]: 2: eth0 inet 10.200.4.13/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:54:20.959155 waagent[1610]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:54:20.959155 waagent[1610]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:54:20.959155 waagent[1610]: 2: eth0 inet6 fe80::7eed:8dff:fe9a:5267/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:54:20.981239 waagent[1610]: 2025-09-13T00:54:20.981177Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 00:54:21.140389 waagent[1610]: 2025-09-13T00:54:21.140266Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Sep 13 00:54:21.143285 waagent[1610]: 2025-09-13T00:54:21.143174Z INFO EnvHandler ExtHandler Firewall rules: Sep 13 00:54:21.143285 waagent[1610]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:21.143285 waagent[1610]: pkts bytes target prot opt in out source destination Sep 13 00:54:21.143285 waagent[1610]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:21.143285 waagent[1610]: pkts bytes target prot opt in out source destination Sep 13 00:54:21.143285 waagent[1610]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:21.143285 waagent[1610]: pkts bytes target prot opt in out source destination Sep 13 00:54:21.143285 waagent[1610]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:54:21.143285 waagent[1610]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:54:21.144631 waagent[1610]: 2025-09-13T00:54:21.144578Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 00:54:21.238453 waagent[1610]: 2025-09-13T00:54:21.238325Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 00:54:22.195864 waagent[1545]: 2025-09-13T00:54:22.195735Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 00:54:22.200891 waagent[1545]: 2025-09-13T00:54:22.200832Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 00:54:23.292576 waagent[1648]: 2025-09-13T00:54:23.292459Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 00:54:23.293301 waagent[1648]: 2025-09-13T00:54:23.293234Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 00:54:23.293460 waagent[1648]: 2025-09-13T00:54:23.293412Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 00:54:23.293621 waagent[1648]: 2025-09-13T00:54:23.293577Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 13 00:54:23.308473 waagent[1648]: 2025-09-13T00:54:23.308365Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:54:23.308898 waagent[1648]: 2025-09-13T00:54:23.308840Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:23.309082 waagent[1648]: 2025-09-13T00:54:23.309034Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:23.309317 waagent[1648]: 2025-09-13T00:54:23.309268Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 00:54:23.321038 waagent[1648]: 2025-09-13T00:54:23.320969Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 00:54:23.332896 waagent[1648]: 2025-09-13T00:54:23.332835Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.177 Sep 13 00:54:23.333840 waagent[1648]: 2025-09-13T00:54:23.333782Z INFO ExtHandler Sep 13 00:54:23.334006 waagent[1648]: 2025-09-13T00:54:23.333957Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 92d6bda4-ca3c-41e9-b923-83570aeec8ee eTag: 10700140876591311304 source: Fabric] Sep 13 00:54:23.334703 waagent[1648]: 2025-09-13T00:54:23.334651Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 00:54:23.335788 waagent[1648]: 2025-09-13T00:54:23.335728Z INFO ExtHandler Sep 13 00:54:23.335938 waagent[1648]: 2025-09-13T00:54:23.335891Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 00:54:23.343989 waagent[1648]: 2025-09-13T00:54:23.343937Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 00:54:23.344466 waagent[1648]: 2025-09-13T00:54:23.344418Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:54:23.362478 waagent[1648]: 2025-09-13T00:54:23.362421Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 00:54:23.413387 waagent[1648]: 2025-09-13T00:54:23.413267Z INFO ExtHandler Downloaded certificate {'thumbprint': 'EA9F5A3D306C122EDE4647020236B10D95530105', 'hasPrivateKey': True} Sep 13 00:54:23.414643 waagent[1648]: 2025-09-13T00:54:23.414581Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 00:54:23.415436 waagent[1648]: 2025-09-13T00:54:23.415377Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 00:54:23.431056 waagent[1648]: 2025-09-13T00:54:23.430962Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 00:54:23.438538 waagent[1648]: 2025-09-13T00:54:23.438432Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:54:23.442203 waagent[1648]: 2025-09-13T00:54:23.442106Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 00:54:23.442431 waagent[1648]: 2025-09-13T00:54:23.442378Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 00:54:23.456466 waagent[1648]: 2025-09-13T00:54:23.456364Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: Sep 13 00:54:23.456466 waagent[1648]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.456466 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.456466 waagent[1648]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.456466 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.456466 waagent[1648]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.456466 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.456466 waagent[1648]: 106 11212 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:54:23.456466 waagent[1648]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:54:23.457571 waagent[1648]: 2025-09-13T00:54:23.457489Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 00:54:23.460112 waagent[1648]: 2025-09-13T00:54:23.460010Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 00:54:23.460381 waagent[1648]: 2025-09-13T00:54:23.460329Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:54:23.460785 waagent[1648]: 2025-09-13T00:54:23.460728Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:54:23.468347 waagent[1648]: 2025-09-13T00:54:23.468289Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:54:23.468855 waagent[1648]: 2025-09-13T00:54:23.468800Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:54:23.476254 waagent[1648]: 2025-09-13T00:54:23.476183Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1648 Sep 13 00:54:23.479213 waagent[1648]: 2025-09-13T00:54:23.479146Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:54:23.479946 waagent[1648]: 2025-09-13T00:54:23.479888Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 00:54:23.480753 waagent[1648]: 2025-09-13T00:54:23.480698Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 00:54:23.483181 waagent[1648]: 2025-09-13T00:54:23.483119Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 00:54:23.483509 waagent[1648]: 2025-09-13T00:54:23.483457Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 00:54:23.484748 waagent[1648]: 2025-09-13T00:54:23.484694Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:54:23.485155 waagent[1648]: 2025-09-13T00:54:23.485099Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:23.485315 waagent[1648]: 2025-09-13T00:54:23.485268Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:23.485848 waagent[1648]: 2025-09-13T00:54:23.485798Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:54:23.486173 waagent[1648]: 2025-09-13T00:54:23.486118Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:54:23.486173 waagent[1648]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:54:23.486173 waagent[1648]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:54:23.486173 waagent[1648]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:54:23.486173 waagent[1648]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:23.486173 waagent[1648]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:23.486173 waagent[1648]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:23.488473 waagent[1648]: 2025-09-13T00:54:23.488392Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:54:23.489673 waagent[1648]: 2025-09-13T00:54:23.489561Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:54:23.489827 waagent[1648]: 2025-09-13T00:54:23.489777Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:54:23.489966 waagent[1648]: 2025-09-13T00:54:23.489898Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:23.491070 waagent[1648]: 2025-09-13T00:54:23.491019Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:54:23.491219 waagent[1648]: 2025-09-13T00:54:23.491155Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:23.491332 waagent[1648]: 2025-09-13T00:54:23.491271Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:54:23.492152 waagent[1648]: 2025-09-13T00:54:23.492102Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:54:23.495973 waagent[1648]: 2025-09-13T00:54:23.495899Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:54:23.496182 waagent[1648]: 2025-09-13T00:54:23.496132Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:54:23.499695 waagent[1648]: 2025-09-13T00:54:23.499588Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:54:23.516250 waagent[1648]: 2025-09-13T00:54:23.516180Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 00:54:23.520342 waagent[1648]: 2025-09-13T00:54:23.520282Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:54:23.520342 waagent[1648]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:54:23.520342 waagent[1648]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:54:23.520342 waagent[1648]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:9a:52:67 brd ff:ff:ff:ff:ff:ff Sep 13 00:54:23.520342 waagent[1648]: 3: enP54572s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:9a:52:67 brd ff:ff:ff:ff:ff:ff\ altname enP54572p0s2 Sep 13 00:54:23.520342 waagent[1648]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:54:23.520342 waagent[1648]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:54:23.520342 waagent[1648]: 2: eth0 inet 10.200.4.13/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:54:23.520342 waagent[1648]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:54:23.520342 waagent[1648]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:54:23.520342 waagent[1648]: 2: eth0 inet6 fe80::7eed:8dff:fe9a:5267/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:54:23.520876 waagent[1648]: 2025-09-13T00:54:23.520819Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:54:23.551786 waagent[1648]: 2025-09-13T00:54:23.551629Z INFO ExtHandler ExtHandler Sep 13 00:54:23.555162 waagent[1648]: 2025-09-13T00:54:23.555027Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 8d3e8e9c-34f2-4bc8-a142-b9ac08711e6b correlation 4d83e777-99e4-4bc9-9cda-1f9fba20b6d0 created: 2025-09-13T00:53:37.210602Z] Sep 13 00:54:23.560327 waagent[1648]: 2025-09-13T00:54:23.560271Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: Sep 13 00:54:23.560327 waagent[1648]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.560327 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.560327 waagent[1648]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.560327 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.560327 waagent[1648]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.560327 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.560327 waagent[1648]: 124 13556 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:54:23.560327 waagent[1648]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:54:23.564215 waagent[1648]: 2025-09-13T00:54:23.564157Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 00:54:23.572629 waagent[1648]: 2025-09-13T00:54:23.572560Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 20 ms] Sep 13 00:54:23.629371 waagent[1648]: 2025-09-13T00:54:23.629272Z INFO EnvHandler ExtHandler The firewall was setup successfully: Sep 13 00:54:23.629371 waagent[1648]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.629371 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.629371 waagent[1648]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.629371 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.629371 waagent[1648]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:23.629371 waagent[1648]: pkts bytes target prot opt in out source destination Sep 13 00:54:23.629371 waagent[1648]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 00:54:23.629371 waagent[1648]: 1 52 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:54:23.629371 waagent[1648]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:54:24.634227 waagent[1648]: 2025-09-13T00:54:24.634149Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 00:54:24.636830 waagent[1648]: 2025-09-13T00:54:24.636762Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 15E7D567-E56F-4BC3-B9D8-E0F87FEAC779;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 00:54:26.438882 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:54:26.439173 systemd[1]: Stopped kubelet.service. Sep 13 00:54:26.439224 systemd[1]: kubelet.service: Consumed 1.093s CPU time. Sep 13 00:54:26.440797 systemd[1]: Starting kubelet.service... Sep 13 00:54:26.533523 systemd[1]: Started kubelet.service. Sep 13 00:54:27.253229 kubelet[1698]: E0913 00:54:27.253170 1698 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:27.256221 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:27.256379 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:37.438932 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:54:37.439200 systemd[1]: Stopped kubelet.service. Sep 13 00:54:37.440754 systemd[1]: Starting kubelet.service... Sep 13 00:54:37.529764 systemd[1]: Started kubelet.service. Sep 13 00:54:38.207719 kubelet[1707]: E0913 00:54:38.207670 1707 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:38.209312 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:38.209467 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:48.438924 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 00:54:48.439190 systemd[1]: Stopped kubelet.service. Sep 13 00:54:48.440738 systemd[1]: Starting kubelet.service... Sep 13 00:54:48.529492 systemd[1]: Started kubelet.service. Sep 13 00:54:49.255086 kubelet[1716]: E0913 00:54:49.255035 1716 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:49.256583 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:49.256737 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:54.267562 systemd[1]: Created slice system-sshd.slice. Sep 13 00:54:54.269223 systemd[1]: Started sshd@0-10.200.4.13:22-10.200.16.10:38160.service. Sep 13 00:54:54.953649 sshd[1722]: Accepted publickey for core from 10.200.16.10 port 38160 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:54.954960 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:54.959440 systemd[1]: Started session-3.scope. Sep 13 00:54:54.959996 systemd-logind[1435]: New session 3 of user core. Sep 13 00:54:55.470106 systemd[1]: Started sshd@1-10.200.4.13:22-10.200.16.10:38170.service. Sep 13 00:54:56.053285 sshd[1727]: Accepted publickey for core from 10.200.16.10 port 38170 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:56.054643 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:56.058115 systemd-logind[1435]: New session 4 of user core. Sep 13 00:54:56.059263 systemd[1]: Started session-4.scope. Sep 13 00:54:56.471992 sshd[1727]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:56.474478 systemd[1]: sshd@1-10.200.4.13:22-10.200.16.10:38170.service: Deactivated successfully. Sep 13 00:54:56.475281 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:54:56.475862 systemd-logind[1435]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:54:56.476598 systemd-logind[1435]: Removed session 4. Sep 13 00:54:56.569917 systemd[1]: Started sshd@2-10.200.4.13:22-10.200.16.10:38172.service. Sep 13 00:54:57.155929 sshd[1733]: Accepted publickey for core from 10.200.16.10 port 38172 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:57.157237 sshd[1733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:57.161711 systemd[1]: Started session-5.scope. Sep 13 00:54:57.162258 systemd-logind[1435]: New session 5 of user core. Sep 13 00:54:57.576011 sshd[1733]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:57.578492 systemd[1]: sshd@2-10.200.4.13:22-10.200.16.10:38172.service: Deactivated successfully. Sep 13 00:54:57.579269 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:54:57.579906 systemd-logind[1435]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:54:57.580657 systemd-logind[1435]: Removed session 5. Sep 13 00:54:57.674041 systemd[1]: Started sshd@3-10.200.4.13:22-10.200.16.10:38186.service. Sep 13 00:54:58.260866 sshd[1739]: Accepted publickey for core from 10.200.16.10 port 38186 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:58.262174 sshd[1739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:58.266627 systemd[1]: Started session-6.scope. Sep 13 00:54:58.267163 systemd-logind[1435]: New session 6 of user core. Sep 13 00:54:58.594537 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 13 00:54:58.683558 sshd[1739]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:58.686049 systemd[1]: sshd@3-10.200.4.13:22-10.200.16.10:38186.service: Deactivated successfully. Sep 13 00:54:58.686860 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:54:58.687430 systemd-logind[1435]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:54:58.688176 systemd-logind[1435]: Removed session 6. Sep 13 00:54:58.780912 systemd[1]: Started sshd@4-10.200.4.13:22-10.200.16.10:38200.service. Sep 13 00:54:59.262166 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 00:54:59.262474 systemd[1]: Stopped kubelet.service. Sep 13 00:54:59.264153 systemd[1]: Starting kubelet.service... Sep 13 00:54:59.354294 systemd[1]: Started kubelet.service. Sep 13 00:54:59.365358 sshd[1745]: Accepted publickey for core from 10.200.16.10 port 38200 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:59.366690 sshd[1745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:59.371507 systemd[1]: Started session-7.scope. Sep 13 00:54:59.372675 systemd-logind[1435]: New session 7 of user core. Sep 13 00:54:59.401068 kubelet[1751]: E0913 00:54:59.401017 1751 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:59.402695 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:59.402856 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:59.871593 update_engine[1436]: I0913 00:54:59.871541 1436 update_attempter.cc:509] Updating boot flags... Sep 13 00:55:00.275045 sudo[1758]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:55:00.275353 sudo[1758]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:55:00.286702 dbus-daemon[1421]: Ѝ\xe7\x8feU: received setenforce notice (enforcing=-544451520) Sep 13 00:55:00.288421 sudo[1758]: pam_unix(sudo:session): session closed for user root Sep 13 00:55:00.394811 sshd[1745]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:00.397759 systemd[1]: sshd@4-10.200.4.13:22-10.200.16.10:38200.service: Deactivated successfully. Sep 13 00:55:00.398600 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:55:00.399187 systemd-logind[1435]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:55:00.399991 systemd-logind[1435]: Removed session 7. Sep 13 00:55:00.493640 systemd[1]: Started sshd@5-10.200.4.13:22-10.200.16.10:38472.service. Sep 13 00:55:01.076743 sshd[1828]: Accepted publickey for core from 10.200.16.10 port 38472 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:01.078071 sshd[1828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:01.082546 systemd[1]: Started session-8.scope. Sep 13 00:55:01.083092 systemd-logind[1435]: New session 8 of user core. Sep 13 00:55:01.399378 sudo[1832]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:55:01.399680 sudo[1832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:55:01.402333 sudo[1832]: pam_unix(sudo:session): session closed for user root Sep 13 00:55:01.406700 sudo[1831]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:55:01.406972 sudo[1831]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:55:01.415075 systemd[1]: Stopping audit-rules.service... Sep 13 00:55:01.414000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:55:01.419714 kernel: kauditd_printk_skb: 130 callbacks suppressed Sep 13 00:55:01.419775 kernel: audit: type=1305 audit(1757724901.414:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:55:01.423688 auditctl[1835]: No rules Sep 13 00:55:01.424156 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:55:01.424324 systemd[1]: Stopped audit-rules.service. Sep 13 00:55:01.427163 systemd[1]: Starting audit-rules.service... Sep 13 00:55:01.414000 audit[1835]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee1664e50 a2=420 a3=0 items=0 ppid=1 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.448614 kernel: audit: type=1300 audit(1757724901.414:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee1664e50 a2=420 a3=0 items=0 ppid=1 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.448711 kernel: audit: type=1327 audit(1757724901.414:213): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:55:01.414000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:55:01.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.450657 augenrules[1852]: No rules Sep 13 00:55:01.453883 systemd[1]: Finished audit-rules.service. Sep 13 00:55:01.456089 sudo[1831]: pam_unix(sudo:session): session closed for user root Sep 13 00:55:01.459410 kernel: audit: type=1131 audit(1757724901.422:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.459474 kernel: audit: type=1130 audit(1757724901.452:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.452000 audit[1831]: USER_END pid=1831 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.481648 kernel: audit: type=1106 audit(1757724901.452:216): pid=1831 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.481706 kernel: audit: type=1104 audit(1757724901.452:217): pid=1831 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.452000 audit[1831]: CRED_DISP pid=1831 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.552635 sshd[1828]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:01.552000 audit[1828]: USER_END pid=1828 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:01.555412 systemd[1]: sshd@5-10.200.4.13:22-10.200.16.10:38472.service: Deactivated successfully. Sep 13 00:55:01.556164 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:55:01.557478 systemd-logind[1435]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:55:01.558586 systemd-logind[1435]: Removed session 8. Sep 13 00:55:01.552000 audit[1828]: CRED_DISP pid=1828 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:01.580252 kernel: audit: type=1106 audit(1757724901.552:218): pid=1828 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:01.580316 kernel: audit: type=1104 audit(1757724901.552:219): pid=1828 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:01.580339 kernel: audit: type=1131 audit(1757724901.552:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.13:22-10.200.16.10:38472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.13:22-10.200.16.10:38472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.650252 systemd[1]: Started sshd@6-10.200.4.13:22-10.200.16.10:38478.service. Sep 13 00:55:01.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.13:22-10.200.16.10:38478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:02.236000 audit[1858]: USER_ACCT pid=1858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.237787 sshd[1858]: Accepted publickey for core from 10.200.16.10 port 38478 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:02.237000 audit[1858]: CRED_ACQ pid=1858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.237000 audit[1858]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce0467e0 a2=3 a3=0 items=0 ppid=1 pid=1858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:02.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:02.239078 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:02.243499 systemd[1]: Started session-9.scope. Sep 13 00:55:02.243952 systemd-logind[1435]: New session 9 of user core. Sep 13 00:55:02.246000 audit[1858]: USER_START pid=1858 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.247000 audit[1860]: CRED_ACQ pid=1860 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.560000 audit[1861]: USER_ACCT pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:02.560000 audit[1861]: CRED_REFR pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:02.562033 sudo[1861]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:55:02.562330 sudo[1861]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:55:02.562000 audit[1861]: USER_START pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:02.588076 systemd[1]: Starting docker.service... Sep 13 00:55:02.625736 env[1871]: time="2025-09-13T00:55:02.625684944Z" level=info msg="Starting up" Sep 13 00:55:02.627949 env[1871]: time="2025-09-13T00:55:02.627925534Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:55:02.628062 env[1871]: time="2025-09-13T00:55:02.628047734Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:55:02.628148 env[1871]: time="2025-09-13T00:55:02.628131934Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:55:02.628224 env[1871]: time="2025-09-13T00:55:02.628211133Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:55:02.630576 env[1871]: time="2025-09-13T00:55:02.630560023Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:55:02.630655 env[1871]: time="2025-09-13T00:55:02.630645623Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:55:02.630699 env[1871]: time="2025-09-13T00:55:02.630690522Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:55:02.630732 env[1871]: time="2025-09-13T00:55:02.630725822Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:55:03.892596 env[1871]: time="2025-09-13T00:55:03.892553386Z" level=info msg="Loading containers: start." Sep 13 00:55:03.923000 audit[1898]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:03.923000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffeabf0d6e0 a2=0 a3=7ffeabf0d6cc items=0 ppid=1871 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:03.923000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 13 00:55:03.925000 audit[1900]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:03.925000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff0a9f43e0 a2=0 a3=7fff0a9f43cc items=0 ppid=1871 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:03.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 13 00:55:03.926000 audit[1902]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:03.926000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcfdd03730 a2=0 a3=7ffcfdd0371c items=0 ppid=1871 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:03.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:55:03.929000 audit[1904]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:03.929000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe97d91da0 a2=0 a3=7ffe97d91d8c items=0 ppid=1871 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:03.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:55:03.930000 audit[1906]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:03.930000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe09fdc90 a2=0 a3=7fffe09fdc7c items=0 ppid=1871 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:03.930000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 13 00:55:03.932000 audit[1908]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:03.932000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff909f1f70 a2=0 a3=7fff909f1f5c items=0 ppid=1871 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:03.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 13 00:55:04.001000 audit[1910]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.001000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbcd7bf60 a2=0 a3=7fffbcd7bf4c items=0 ppid=1871 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 13 00:55:04.003000 audit[1912]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.003000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff408d0ae0 a2=0 a3=7fff408d0acc items=0 ppid=1871 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.003000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 13 00:55:04.005000 audit[1914]: NETFILTER_CFG table=filter:17 family=2 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.005000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffe748a860 a2=0 a3=7fffe748a84c items=0 ppid=1871 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:55:04.099000 audit[1918]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_unregister_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.099000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff36e34000 a2=0 a3=7fff36e33fec items=0 ppid=1871 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:55:04.105000 audit[1919]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.105000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc42bbe5b0 a2=0 a3=7ffc42bbe59c items=0 ppid=1871 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:55:04.128541 kernel: Initializing XFRM netlink socket Sep 13 00:55:04.148277 env[1871]: time="2025-09-13T00:55:04.148177384Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 13 00:55:04.190000 audit[1927]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.190000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd994cb3c0 a2=0 a3=7ffd994cb3ac items=0 ppid=1871 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 13 00:55:04.204000 audit[1930]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.204000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffea51704e0 a2=0 a3=7ffea51704cc items=0 ppid=1871 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 13 00:55:04.207000 audit[1933]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.207000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff8d8c41f0 a2=0 a3=7fff8d8c41dc items=0 ppid=1871 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 13 00:55:04.209000 audit[1935]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.209000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc8d5a6660 a2=0 a3=7ffc8d5a664c items=0 ppid=1871 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 13 00:55:04.211000 audit[1937]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.211000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc5f3243c0 a2=0 a3=7ffc5f3243ac items=0 ppid=1871 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 13 00:55:04.214000 audit[1939]: NETFILTER_CFG table=nat:25 family=2 entries=2 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.214000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcbc3d7bb0 a2=0 a3=7ffcbc3d7b9c items=0 ppid=1871 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 13 00:55:04.215000 audit[1941]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.215000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd5bcaf860 a2=0 a3=7ffd5bcaf84c items=0 ppid=1871 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 13 00:55:04.218000 audit[1943]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.218000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe075d4ee0 a2=0 a3=7ffe075d4ecc items=0 ppid=1871 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.218000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 13 00:55:04.220000 audit[1945]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.220000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcaa447e50 a2=0 a3=7ffcaa447e3c items=0 ppid=1871 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:55:04.222000 audit[1947]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.222000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe91dff0b0 a2=0 a3=7ffe91dff09c items=0 ppid=1871 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:55:04.223000 audit[1949]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.223000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffef34e190 a2=0 a3=7fffef34e17c items=0 ppid=1871 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.223000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 13 00:55:04.225801 systemd-networkd[1604]: docker0: Link UP Sep 13 00:55:04.291000 audit[1953]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_unregister_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.291000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffefbf7fa90 a2=0 a3=7ffefbf7fa7c items=0 ppid=1871 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:55:04.296000 audit[1954]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:04.296000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe3ac051e0 a2=0 a3=7ffe3ac051cc items=0 ppid=1871 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:04.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:55:04.298869 env[1871]: time="2025-09-13T00:55:04.298836810Z" level=info msg="Loading containers: done." Sep 13 00:55:06.293499 env[1871]: time="2025-09-13T00:55:06.293443573Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 13 00:55:06.293996 env[1871]: time="2025-09-13T00:55:06.293704072Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 13 00:55:06.293996 env[1871]: time="2025-09-13T00:55:06.293838771Z" level=info msg="Daemon has completed initialization" Sep 13 00:55:06.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:06.448529 systemd[1]: Started docker.service. Sep 13 00:55:06.451971 kernel: kauditd_printk_skb: 83 callbacks suppressed Sep 13 00:55:06.452065 kernel: audit: type=1130 audit(1757724906.448:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:06.460297 env[1871]: time="2025-09-13T00:55:06.460251014Z" level=info msg="API listen on /run/docker.sock" Sep 13 00:55:08.559704 env[1457]: time="2025-09-13T00:55:08.559662014Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\"" Sep 13 00:55:09.438884 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 13 00:55:09.451056 kernel: audit: type=1130 audit(1757724909.438:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:09.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:09.439127 systemd[1]: Stopped kubelet.service. Sep 13 00:55:09.440640 systemd[1]: Starting kubelet.service... Sep 13 00:55:09.464540 kernel: audit: type=1131 audit(1757724909.438:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:09.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:09.536597 systemd[1]: Started kubelet.service. Sep 13 00:55:09.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:09.552552 kernel: audit: type=1130 audit(1757724909.536:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:10.210526 kubelet[1991]: E0913 00:55:10.210473 1991 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:55:10.212038 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:55:10.212207 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:55:10.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:55:10.225537 kernel: audit: type=1131 audit(1757724910.211:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:55:12.953369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1126194161.mount: Deactivated successfully. Sep 13 00:55:20.458598 kernel: audit: type=1130 audit(1757724920.438:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.439064 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Sep 13 00:55:20.439310 systemd[1]: Stopped kubelet.service. Sep 13 00:55:20.458310 systemd[1]: Starting kubelet.service... Sep 13 00:55:20.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.479006 kernel: audit: type=1131 audit(1757724920.438:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.599294 systemd[1]: Started kubelet.service. Sep 13 00:55:20.615535 kernel: audit: type=1130 audit(1757724920.599:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:21.215834 kubelet[2005]: E0913 00:55:21.215784 2005 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:55:21.217327 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:55:21.217488 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:55:21.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:55:21.231549 kernel: audit: type=1131 audit(1757724921.217:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:55:21.261906 env[1457]: time="2025-09-13T00:55:21.261849912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:21.277805 env[1457]: time="2025-09-13T00:55:21.277753997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:21.283362 env[1457]: time="2025-09-13T00:55:21.283327341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:21.290190 env[1457]: time="2025-09-13T00:55:21.290156306Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6df11cc2ad9679b1117be34d3a0230add88bc0a08fd7a3ebc26b680575e8de97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:21.290822 env[1457]: time="2025-09-13T00:55:21.290793665Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\" returns image reference \"sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59\"" Sep 13 00:55:21.291527 env[1457]: time="2025-09-13T00:55:21.291491720Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\"" Sep 13 00:55:23.278655 env[1457]: time="2025-09-13T00:55:23.278601324Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:23.284763 env[1457]: time="2025-09-13T00:55:23.284726655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:23.288499 env[1457]: time="2025-09-13T00:55:23.288468629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:23.292203 env[1457]: time="2025-09-13T00:55:23.292171705Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:243c4b8e3bce271fcb1b78008ab996ab6976b1a20096deac08338fcd17979922,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:23.292918 env[1457]: time="2025-09-13T00:55:23.292886262Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\" returns image reference \"sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91\"" Sep 13 00:55:23.293413 env[1457]: time="2025-09-13T00:55:23.293389832Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\"" Sep 13 00:55:24.849219 env[1457]: time="2025-09-13T00:55:24.849167597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:24.855143 env[1457]: time="2025-09-13T00:55:24.855102349Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:24.859337 env[1457]: time="2025-09-13T00:55:24.859306102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:24.863659 env[1457]: time="2025-09-13T00:55:24.863628648Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:50c49520dbd0e8b4076b6a5c77d8014df09ea3d59a73e8bafd2678d51ebb92d5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:24.864272 env[1457]: time="2025-09-13T00:55:24.864241812Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\" returns image reference \"sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5\"" Sep 13 00:55:24.864895 env[1457]: time="2025-09-13T00:55:24.864872375Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Sep 13 00:55:26.232291 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2557471013.mount: Deactivated successfully. Sep 13 00:55:26.964510 env[1457]: time="2025-09-13T00:55:26.964455856Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:26.972234 env[1457]: time="2025-09-13T00:55:26.972193826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:26.977670 env[1457]: time="2025-09-13T00:55:26.977639023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:26.980761 env[1457]: time="2025-09-13T00:55:26.980732251Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:26.981105 env[1457]: time="2025-09-13T00:55:26.981074832Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Sep 13 00:55:26.981695 env[1457]: time="2025-09-13T00:55:26.981670599Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Sep 13 00:55:27.626134 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount90860454.mount: Deactivated successfully. Sep 13 00:55:29.048560 env[1457]: time="2025-09-13T00:55:29.048500995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.054835 env[1457]: time="2025-09-13T00:55:29.054792673Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.062759 env[1457]: time="2025-09-13T00:55:29.062721466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.068159 env[1457]: time="2025-09-13T00:55:29.068125289Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.068773 env[1457]: time="2025-09-13T00:55:29.068738957Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Sep 13 00:55:29.069359 env[1457]: time="2025-09-13T00:55:29.069335327Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 13 00:55:29.671886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2352482517.mount: Deactivated successfully. Sep 13 00:55:29.692138 env[1457]: time="2025-09-13T00:55:29.692092895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.698601 env[1457]: time="2025-09-13T00:55:29.698565663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.704151 env[1457]: time="2025-09-13T00:55:29.704120578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.708734 env[1457]: time="2025-09-13T00:55:29.708706043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:29.709097 env[1457]: time="2025-09-13T00:55:29.709070224Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 13 00:55:29.710772 env[1457]: time="2025-09-13T00:55:29.710748438Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Sep 13 00:55:30.420439 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount221063160.mount: Deactivated successfully. Sep 13 00:55:31.438867 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Sep 13 00:55:31.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:31.439136 systemd[1]: Stopped kubelet.service. Sep 13 00:55:31.440660 systemd[1]: Starting kubelet.service... Sep 13 00:55:31.469757 kernel: audit: type=1130 audit(1757724931.437:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:31.469899 kernel: audit: type=1131 audit(1757724931.437:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:31.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:31.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:31.541141 systemd[1]: Started kubelet.service. Sep 13 00:55:31.557552 kernel: audit: type=1130 audit(1757724931.539:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:31.581851 kubelet[2015]: E0913 00:55:31.581806 2015 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:55:31.583271 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:55:31.583425 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:55:31.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:55:31.597535 kernel: audit: type=1131 audit(1757724931.582:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:55:33.901087 env[1457]: time="2025-09-13T00:55:33.901037686Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.911038 env[1457]: time="2025-09-13T00:55:33.910999027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.914723 env[1457]: time="2025-09-13T00:55:33.914693057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.918594 env[1457]: time="2025-09-13T00:55:33.918562478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.919259 env[1457]: time="2025-09-13T00:55:33.919227648Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Sep 13 00:55:36.596791 systemd[1]: Stopped kubelet.service. Sep 13 00:55:36.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:36.601636 systemd[1]: Starting kubelet.service... Sep 13 00:55:36.611650 kernel: audit: type=1130 audit(1757724936.596:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:36.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:36.627743 kernel: audit: type=1131 audit(1757724936.599:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:36.657728 systemd[1]: Reloading. Sep 13 00:55:36.765451 /usr/lib/systemd/system-generators/torcx-generator[2065]: time="2025-09-13T00:55:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:55:36.765488 /usr/lib/systemd/system-generators/torcx-generator[2065]: time="2025-09-13T00:55:36Z" level=info msg="torcx already run" Sep 13 00:55:36.854520 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:55:36.854541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:55:36.869412 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.946539 kernel: audit: type=1400 audit(1757724936.931:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.975287 kernel: audit: type=1400 audit(1757724936.931:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.975363 kernel: audit: type=1400 audit(1757724936.931:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.975389 kernel: audit: type=1400 audit(1757724936.931:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002410 kernel: audit: type=1400 audit(1757724936.931:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.030215 kernel: audit: type=1400 audit(1757724936.931:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.030291 kernel: audit: type=1400 audit(1757724936.931:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.030334 kernel: audit: type=1400 audit(1757724936.931:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit: BPF prog-id=41 op=LOAD Sep 13 00:55:36.945000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.946000 audit: BPF prog-id=42 op=LOAD Sep 13 00:55:36.946000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit: BPF prog-id=43 op=LOAD Sep 13 00:55:36.988000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit: BPF prog-id=44 op=LOAD Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.002000 audit: BPF prog-id=45 op=LOAD Sep 13 00:55:37.002000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:55:37.002000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.016000 audit: BPF prog-id=46 op=LOAD Sep 13 00:55:37.016000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:55:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit: BPF prog-id=50 op=LOAD Sep 13 00:55:37.047000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit: BPF prog-id=51 op=LOAD Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.047000 audit: BPF prog-id=52 op=LOAD Sep 13 00:55:37.047000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:55:37.047000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.048000 audit: BPF prog-id=53 op=LOAD Sep 13 00:55:37.048000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:55:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit: BPF prog-id=54 op=LOAD Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:37.049000 audit: BPF prog-id=55 op=LOAD Sep 13 00:55:37.049000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:55:37.049000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:55:37.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:37.068990 systemd[1]: Started kubelet.service. Sep 13 00:55:37.072027 systemd[1]: Stopping kubelet.service... Sep 13 00:55:37.072364 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:55:37.072827 systemd[1]: Stopped kubelet.service. Sep 13 00:55:37.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:37.074418 systemd[1]: Starting kubelet.service... Sep 13 00:55:37.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:37.349021 systemd[1]: Started kubelet.service. Sep 13 00:55:37.386468 kubelet[2135]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:55:37.387236 kubelet[2135]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:55:37.387236 kubelet[2135]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:55:37.387401 kubelet[2135]: I0913 00:55:37.387363 2135 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:55:38.238057 kubelet[2135]: I0913 00:55:38.238016 2135 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 00:55:38.238057 kubelet[2135]: I0913 00:55:38.238046 2135 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:55:38.238364 kubelet[2135]: I0913 00:55:38.238346 2135 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 00:55:38.267825 kubelet[2135]: E0913 00:55:38.267789 2135 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:38.268991 kubelet[2135]: I0913 00:55:38.268965 2135 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:55:38.278488 kubelet[2135]: E0913 00:55:38.278454 2135 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:55:38.278639 kubelet[2135]: I0913 00:55:38.278621 2135 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:55:38.282070 kubelet[2135]: I0913 00:55:38.282048 2135 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:55:38.284498 kubelet[2135]: I0913 00:55:38.284454 2135 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:55:38.284715 kubelet[2135]: I0913 00:55:38.284498 2135 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.8-n-0eeb704727","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:55:38.284867 kubelet[2135]: I0913 00:55:38.284724 2135 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:55:38.284867 kubelet[2135]: I0913 00:55:38.284737 2135 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 00:55:38.284947 kubelet[2135]: I0913 00:55:38.284884 2135 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:55:38.288781 kubelet[2135]: I0913 00:55:38.288763 2135 kubelet.go:446] "Attempting to sync node with API server" Sep 13 00:55:38.294469 kubelet[2135]: I0913 00:55:38.294441 2135 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:55:38.294561 kubelet[2135]: I0913 00:55:38.294487 2135 kubelet.go:352] "Adding apiserver pod source" Sep 13 00:55:38.294561 kubelet[2135]: I0913 00:55:38.294501 2135 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:55:38.313633 kubelet[2135]: W0913 00:55:38.313586 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:38.313737 kubelet[2135]: E0913 00:55:38.313655 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:38.314873 kubelet[2135]: W0913 00:55:38.314337 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:38.314873 kubelet[2135]: E0913 00:55:38.314392 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:38.314873 kubelet[2135]: I0913 00:55:38.314497 2135 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:55:38.315024 kubelet[2135]: I0913 00:55:38.314974 2135 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:55:38.320254 kubelet[2135]: W0913 00:55:38.320230 2135 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:55:38.328276 kubelet[2135]: I0913 00:55:38.328256 2135 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:55:38.328363 kubelet[2135]: I0913 00:55:38.328309 2135 server.go:1287] "Started kubelet" Sep 13 00:55:38.330000 audit[2135]: AVC avc: denied { mac_admin } for pid=2135 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.330000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:55:38.330000 audit[2135]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7a6c0 a1=c000b8c3f0 a2=c000b7a690 a3=25 items=0 ppid=1 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.330000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:55:38.331011 kubelet[2135]: I0913 00:55:38.330990 2135 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:55:38.330000 audit[2135]: AVC avc: denied { mac_admin } for pid=2135 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.330000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:55:38.330000 audit[2135]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000836f00 a1=c000b8c408 a2=c000b7a750 a3=25 items=0 ppid=1 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.330000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:55:38.331300 kubelet[2135]: I0913 00:55:38.331097 2135 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:55:38.331300 kubelet[2135]: I0913 00:55:38.331198 2135 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:55:38.334000 audit[2147]: NETFILTER_CFG table=mangle:33 family=2 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:38.334000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe7597c3d0 a2=0 a3=7ffe7597c3bc items=0 ppid=2135 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:55:38.335000 audit[2148]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:38.335000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcd39ae10 a2=0 a3=7fffcd39adfc items=0 ppid=2135 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:55:38.338097 kubelet[2135]: I0913 00:55:38.337586 2135 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:55:38.338324 kubelet[2135]: E0913 00:55:38.336794 2135 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.13:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.13:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.8-n-0eeb704727.1864b184c1e6e6e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.8-n-0eeb704727,UID:ci-3510.3.8-n-0eeb704727,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.8-n-0eeb704727,},FirstTimestamp:2025-09-13 00:55:38.328270564 +0000 UTC m=+0.974101169,LastTimestamp:2025-09-13 00:55:38.328270564 +0000 UTC m=+0.974101169,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.8-n-0eeb704727,}" Sep 13 00:55:38.338877 kubelet[2135]: I0913 00:55:38.338672 2135 server.go:479] "Adding debug handlers to kubelet server" Sep 13 00:55:38.339534 kubelet[2135]: E0913 00:55:38.339502 2135 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:55:38.339939 kubelet[2135]: I0913 00:55:38.339885 2135 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:55:38.340018 kubelet[2135]: I0913 00:55:38.340005 2135 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:55:38.340208 kubelet[2135]: E0913 00:55:38.340164 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:38.340329 kubelet[2135]: I0913 00:55:38.340318 2135 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:55:38.340426 kubelet[2135]: I0913 00:55:38.339989 2135 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:55:38.340759 kubelet[2135]: I0913 00:55:38.340745 2135 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:55:38.340000 audit[2150]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:38.340000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3c8f5d30 a2=0 a3=7ffe3c8f5d1c items=0 ppid=2135 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:55:38.343024 kubelet[2135]: I0913 00:55:38.343010 2135 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:55:38.343000 audit[2152]: NETFILTER_CFG table=filter:36 family=2 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:38.343000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcdf10a9d0 a2=0 a3=7ffcdf10a9bc items=0 ppid=2135 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:55:38.344842 kubelet[2135]: I0913 00:55:38.344821 2135 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:55:38.345358 kubelet[2135]: E0913 00:55:38.345330 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="200ms" Sep 13 00:55:38.346494 kubelet[2135]: W0913 00:55:38.346451 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:38.346621 kubelet[2135]: E0913 00:55:38.346505 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:38.346708 kubelet[2135]: I0913 00:55:38.346687 2135 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:55:38.346708 kubelet[2135]: I0913 00:55:38.346702 2135 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:55:38.433842 kubelet[2135]: I0913 00:55:38.433816 2135 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:55:38.433842 kubelet[2135]: I0913 00:55:38.433832 2135 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:55:38.434237 kubelet[2135]: I0913 00:55:38.433852 2135 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:55:38.440543 kubelet[2135]: E0913 00:55:38.440518 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:38.541037 kubelet[2135]: E0913 00:55:38.540913 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:38.546674 kubelet[2135]: E0913 00:55:38.546642 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="400ms" Sep 13 00:55:38.641172 kubelet[2135]: E0913 00:55:38.641081 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:38.741751 kubelet[2135]: E0913 00:55:38.741715 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:38.842845 kubelet[2135]: E0913 00:55:38.842744 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:38.943450 kubelet[2135]: E0913 00:55:38.943409 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.542812 kubelet[2135]: E0913 00:55:38.947920 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="800ms" Sep 13 00:55:39.542812 kubelet[2135]: E0913 00:55:39.044403 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.542812 kubelet[2135]: E0913 00:55:39.144990 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.542812 kubelet[2135]: W0913 00:55:39.223773 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:39.542812 kubelet[2135]: E0913 00:55:39.223828 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:39.542812 kubelet[2135]: E0913 00:55:39.245358 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.542812 kubelet[2135]: W0913 00:55:39.290241 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:39.543217 kubelet[2135]: E0913 00:55:39.290300 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:39.543217 kubelet[2135]: E0913 00:55:39.345531 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.543217 kubelet[2135]: E0913 00:55:39.446153 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.546850 kubelet[2135]: E0913 00:55:39.546819 2135 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.590000 audit[2158]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:39.590000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc3287bb70 a2=0 a3=7ffc3287bb5c items=0 ppid=2135 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:55:39.592000 audit[2160]: NETFILTER_CFG table=mangle:38 family=10 entries=2 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:39.592000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe09b00bb0 a2=0 a3=7ffe09b00b9c items=0 ppid=2135 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:55:39.592000 audit[2161]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:39.592000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe1842ef0 a2=0 a3=7fffe1842edc items=0 ppid=2135 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:55:39.595000 audit[2162]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:39.595000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc6bc6110 a2=0 a3=7ffcc6bc60fc items=0 ppid=2135 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:55:39.596000 audit[2163]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:39.596000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc1f6e180 a2=0 a3=7ffcc1f6e16c items=0 ppid=2135 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.591699 2135 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.593585 2135 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.593610 2135 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.593634 2135 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.593643 2135 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 00:55:39.597082 kubelet[2135]: E0913 00:55:39.593703 2135 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:55:39.597082 kubelet[2135]: W0913 00:55:39.594342 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:39.597082 kubelet[2135]: E0913 00:55:39.594429 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.595181 2135 policy_none.go:49] "None policy: Start" Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.595202 2135 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:55:39.597082 kubelet[2135]: I0913 00:55:39.595218 2135 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:55:39.597000 audit[2166]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:39.597000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffae456910 a2=0 a3=7fffae4568fc items=0 ppid=2135 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:55:39.598000 audit[2165]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:39.598000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd3ac58bd0 a2=0 a3=7ffd3ac58bbc items=0 ppid=2135 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:55:39.599000 audit[2167]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:39.599000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd863f03a0 a2=0 a3=7ffd863f038c items=0 ppid=2135 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:55:39.606331 systemd[1]: Created slice kubepods.slice. Sep 13 00:55:39.611056 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:55:39.613851 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:55:39.620243 kubelet[2135]: I0913 00:55:39.620212 2135 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:55:39.619000 audit[2135]: AVC avc: denied { mac_admin } for pid=2135 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:39.619000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:55:39.619000 audit[2135]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a07a40 a1=c000942c60 a2=c000a07a10 a3=25 items=0 ppid=1 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:39.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:55:39.620595 kubelet[2135]: I0913 00:55:39.620301 2135 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:55:39.620595 kubelet[2135]: I0913 00:55:39.620448 2135 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:55:39.620595 kubelet[2135]: I0913 00:55:39.620462 2135 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:55:39.622083 kubelet[2135]: I0913 00:55:39.621593 2135 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:55:39.623555 kubelet[2135]: E0913 00:55:39.623499 2135 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:55:39.624136 kubelet[2135]: E0913 00:55:39.624046 2135 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:39.624136 kubelet[2135]: W0913 00:55:39.623863 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:39.624260 kubelet[2135]: E0913 00:55:39.624172 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:39.702670 systemd[1]: Created slice kubepods-burstable-pod95e314810a5a44f490c8f33ac93a09fa.slice. Sep 13 00:55:39.708417 kubelet[2135]: E0913 00:55:39.708381 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.710854 systemd[1]: Created slice kubepods-burstable-pod1bc5dcf4732a53e806bd4c8f34e11526.slice. Sep 13 00:55:39.713143 kubelet[2135]: E0913 00:55:39.713120 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.714952 systemd[1]: Created slice kubepods-burstable-podc842bb44a68058c513b6bb339b0a2e30.slice. Sep 13 00:55:39.716887 kubelet[2135]: E0913 00:55:39.716864 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.721937 kubelet[2135]: I0913 00:55:39.721922 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.722319 kubelet[2135]: E0913 00:55:39.722277 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.749175 kubelet[2135]: E0913 00:55:39.749133 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="1.6s" Sep 13 00:55:39.751279 kubelet[2135]: I0913 00:55:39.751257 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1bc5dcf4732a53e806bd4c8f34e11526-kubeconfig\") pod \"kube-scheduler-ci-3510.3.8-n-0eeb704727\" (UID: \"1bc5dcf4732a53e806bd4c8f34e11526\") " pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751369 kubelet[2135]: I0913 00:55:39.751295 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c842bb44a68058c513b6bb339b0a2e30-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" (UID: \"c842bb44a68058c513b6bb339b0a2e30\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751369 kubelet[2135]: I0913 00:55:39.751322 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-ca-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751369 kubelet[2135]: I0913 00:55:39.751349 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751530 kubelet[2135]: I0913 00:55:39.751374 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751530 kubelet[2135]: I0913 00:55:39.751411 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751530 kubelet[2135]: I0913 00:55:39.751443 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751530 kubelet[2135]: I0913 00:55:39.751469 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c842bb44a68058c513b6bb339b0a2e30-ca-certs\") pod \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" (UID: \"c842bb44a68058c513b6bb339b0a2e30\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.751530 kubelet[2135]: I0913 00:55:39.751498 2135 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c842bb44a68058c513b6bb339b0a2e30-k8s-certs\") pod \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" (UID: \"c842bb44a68058c513b6bb339b0a2e30\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.926103 kubelet[2135]: I0913 00:55:39.924774 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:39.926103 kubelet[2135]: E0913 00:55:39.925122 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:40.009707 env[1457]: time="2025-09-13T00:55:40.009660788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.8-n-0eeb704727,Uid:95e314810a5a44f490c8f33ac93a09fa,Namespace:kube-system,Attempt:0,}" Sep 13 00:55:40.041410 env[1457]: time="2025-09-13T00:55:40.014157614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.8-n-0eeb704727,Uid:1bc5dcf4732a53e806bd4c8f34e11526,Namespace:kube-system,Attempt:0,}" Sep 13 00:55:40.041410 env[1457]: time="2025-09-13T00:55:40.017614281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.8-n-0eeb704727,Uid:c842bb44a68058c513b6bb339b0a2e30,Namespace:kube-system,Attempt:0,}" Sep 13 00:55:40.327285 kubelet[2135]: I0913 00:55:40.327260 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:40.327822 kubelet[2135]: E0913 00:55:40.327794 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:40.378107 kubelet[2135]: E0913 00:55:40.378077 2135 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:40.873151 kubelet[2135]: W0913 00:55:40.873118 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:40.873475 kubelet[2135]: E0913 00:55:40.873159 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:40.895955 kubelet[2135]: W0913 00:55:40.895922 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:40.896080 kubelet[2135]: E0913 00:55:40.895965 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:41.129660 kubelet[2135]: I0913 00:55:41.129566 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:41.130122 kubelet[2135]: E0913 00:55:41.130094 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:41.350097 kubelet[2135]: E0913 00:55:41.350037 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="3.2s" Sep 13 00:55:41.731592 kubelet[2135]: W0913 00:55:41.731557 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:41.731753 kubelet[2135]: E0913 00:55:41.731601 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:41.875826 kubelet[2135]: W0913 00:55:41.875789 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:41.876158 kubelet[2135]: E0913 00:55:41.875833 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:42.731843 kubelet[2135]: I0913 00:55:42.731802 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:42.732206 kubelet[2135]: E0913 00:55:42.732175 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:42.791505 kubelet[2135]: W0913 00:55:42.791471 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:42.791657 kubelet[2135]: E0913 00:55:42.791529 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:44.489042 kubelet[2135]: E0913 00:55:44.489002 2135 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:44.551025 kubelet[2135]: E0913 00:55:44.550978 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="6.4s" Sep 13 00:55:45.843474 kubelet[2135]: W0913 00:55:45.843437 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:45.843828 kubelet[2135]: E0913 00:55:45.843482 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:45.934417 kubelet[2135]: I0913 00:55:45.934384 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:45.934771 kubelet[2135]: E0913 00:55:45.934744 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:50.205361 kubelet[2135]: W0913 00:55:46.238197 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:50.205361 kubelet[2135]: E0913 00:55:46.238235 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-0eeb704727&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:50.205361 kubelet[2135]: E0913 00:55:47.282502 2135 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.13:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.13:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.8-n-0eeb704727.1864b184c1e6e6e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.8-n-0eeb704727,UID:ci-3510.3.8-n-0eeb704727,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.8-n-0eeb704727,},FirstTimestamp:2025-09-13 00:55:38.328270564 +0000 UTC m=+0.974101169,LastTimestamp:2025-09-13 00:55:38.328270564 +0000 UTC m=+0.974101169,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.8-n-0eeb704727,}" Sep 13 00:55:50.205361 kubelet[2135]: W0913 00:55:47.535195 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:50.205913 kubelet[2135]: E0913 00:55:47.535232 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:50.205913 kubelet[2135]: W0913 00:55:47.938667 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:50.205913 kubelet[2135]: E0913 00:55:47.938716 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:50.205913 kubelet[2135]: E0913 00:55:49.624838 2135 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:55:50.952133 kubelet[2135]: E0913 00:55:50.952081 2135 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-0eeb704727?timeout=10s\": dial tcp 10.200.4.13:6443: connect: connection refused" interval="7s" Sep 13 00:55:52.336679 kubelet[2135]: I0913 00:55:52.336359 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:52.336679 kubelet[2135]: E0913 00:55:52.336655 2135 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.13:6443/api/v1/nodes\": dial tcp 10.200.4.13:6443: connect: connection refused" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:52.763836 kubelet[2135]: E0913 00:55:52.763799 2135 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:54.604142 kubelet[2135]: W0913 00:55:54.604106 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:54.604471 kubelet[2135]: E0913 00:55:54.604150 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:55.445741 kubelet[2135]: W0913 00:55:55.445698 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:55.445907 kubelet[2135]: E0913 00:55:55.445747 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:56.724928 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3917581174.mount: Deactivated successfully. Sep 13 00:55:56.760993 env[1457]: time="2025-09-13T00:55:56.760939568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.767630 env[1457]: time="2025-09-13T00:55:56.767590093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.778226 env[1457]: time="2025-09-13T00:55:56.778193114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.785842 env[1457]: time="2025-09-13T00:55:56.785807514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.789409 env[1457]: time="2025-09-13T00:55:56.789378720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.795588 env[1457]: time="2025-09-13T00:55:56.795559957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.798529 env[1457]: time="2025-09-13T00:55:56.798489280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.804938 env[1457]: time="2025-09-13T00:55:56.804904411Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.808444 env[1457]: time="2025-09-13T00:55:56.808418418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.819632 env[1457]: time="2025-09-13T00:55:56.819605424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.824978 env[1457]: time="2025-09-13T00:55:56.824947783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.836299 env[1457]: time="2025-09-13T00:55:56.836267685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:56.899583 env[1457]: time="2025-09-13T00:55:56.899081632Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:56.899583 env[1457]: time="2025-09-13T00:55:56.899123431Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:56.899583 env[1457]: time="2025-09-13T00:55:56.899152630Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:56.900086 env[1457]: time="2025-09-13T00:55:56.900004808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe6b51ec61c472cb4f20ae56505622f583e9d53cfa259343cdc0c2b76989acda pid=2176 runtime=io.containerd.runc.v2 Sep 13 00:55:56.907780 env[1457]: time="2025-09-13T00:55:56.907706205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:56.907969 env[1457]: time="2025-09-13T00:55:56.907942199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:56.908097 env[1457]: time="2025-09-13T00:55:56.908071795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:56.908451 env[1457]: time="2025-09-13T00:55:56.908364288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f0bed99ad1f9a5296e26c18a2d6e2c4f36f0b7f13e5bc7e4ad9af2821291d40 pid=2192 runtime=io.containerd.runc.v2 Sep 13 00:55:56.920167 systemd[1]: Started cri-containerd-fe6b51ec61c472cb4f20ae56505622f583e9d53cfa259343cdc0c2b76989acda.scope. Sep 13 00:55:56.938038 systemd[1]: Started cri-containerd-2f0bed99ad1f9a5296e26c18a2d6e2c4f36f0b7f13e5bc7e4ad9af2821291d40.scope. Sep 13 00:55:56.941697 env[1457]: time="2025-09-13T00:55:56.936948235Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:56.941697 env[1457]: time="2025-09-13T00:55:56.937009734Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:56.941697 env[1457]: time="2025-09-13T00:55:56.937027833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:56.941697 env[1457]: time="2025-09-13T00:55:56.937189529Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0560ca519af39f1a38ce6abfdaf27dc1aa8b89739ac2093939a97ff227d60f40 pid=2224 runtime=io.containerd.runc.v2 Sep 13 00:55:56.967180 kernel: kauditd_printk_skb: 273 callbacks suppressed Sep 13 00:55:56.967309 kernel: audit: type=1400 audit(1757724956.945:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.985981 systemd[1]: Started cri-containerd-0560ca519af39f1a38ce6abfdaf27dc1aa8b89739ac2093939a97ff227d60f40.scope. Sep 13 00:55:56.988562 kernel: audit: type=1400 audit(1757724956.945:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.006998 kernel: audit: type=1400 audit(1757724956.945:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.022565 kernel: audit: type=1400 audit(1757724956.945:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.042535 kernel: audit: type=1400 audit(1757724956.945:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.042598 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:55:57.061350 kernel: audit: type=1400 audit(1757724956.945:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.061459 kernel: audit: audit_lost=30 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.084086 kernel: audit: type=1400 audit(1757724956.945:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.084198 kernel: audit: backlog limit exceeded Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit: BPF prog-id=56 op=LOAD Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2176 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:56.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235316563363163343732636234663230616535363530353632 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2176 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:56.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235316563363163343732636234663230616535363530353632 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.951000 audit: BPF prog-id=57 op=LOAD Sep 13 00:55:56.951000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000395b70 items=0 ppid=2176 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:56.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235316563363163343732636234663230616535363530353632 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit: BPF prog-id=58 op=LOAD Sep 13 00:55:56.965000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000395bb8 items=0 ppid=2176 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:56.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235316563363163343732636234663230616535363530353632 Sep 13 00:55:56.965000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:55:56.965000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:56.965000 audit: BPF prog-id=59 op=LOAD Sep 13 00:55:56.965000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000395fc8 items=0 ppid=2176 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:56.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235316563363163343732636234663230616535363530353632 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.079000 audit: BPF prog-id=60 op=LOAD Sep 13 00:55:57.079000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.079000 audit[2244]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216350 items=0 ppid=2224 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363063613531396166333966316133386365366162666461663237 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit: BPF prog-id=62 op=LOAD Sep 13 00:55:57.083000 audit[2244]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216398 items=0 ppid=2224 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363063613531396166333966316133386365366162666461663237 Sep 13 00:55:57.083000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:55:57.083000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.083000 audit: BPF prog-id=63 op=LOAD Sep 13 00:55:57.083000 audit[2244]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002167a8 items=0 ppid=2224 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363063613531396166333966316133386365366162666461663237 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.088000 audit: BPF prog-id=64 op=LOAD Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2192 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306265643939616431663961353239366532366331386132643665 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2192 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306265643939616431663961353239366532366331386132643665 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.089000 audit: BPF prog-id=65 op=LOAD Sep 13 00:55:57.089000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00026dd90 items=0 ppid=2192 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306265643939616431663961353239366532366331386132643665 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit: BPF prog-id=66 op=LOAD Sep 13 00:55:57.090000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00026ddd8 items=0 ppid=2192 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306265643939616431663961353239366532366331386132643665 Sep 13 00:55:57.090000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:55:57.090000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.090000 audit: BPF prog-id=67 op=LOAD Sep 13 00:55:57.090000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0003621e8 items=0 ppid=2192 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306265643939616431663961353239366532366331386132643665 Sep 13 00:55:57.093363 env[1457]: time="2025-09-13T00:55:57.087358125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.8-n-0eeb704727,Uid:95e314810a5a44f490c8f33ac93a09fa,Namespace:kube-system,Attempt:0,} returns sandbox id \"fe6b51ec61c472cb4f20ae56505622f583e9d53cfa259343cdc0c2b76989acda\"" Sep 13 00:55:57.093363 env[1457]: time="2025-09-13T00:55:57.092465594Z" level=info msg="CreateContainer within sandbox \"fe6b51ec61c472cb4f20ae56505622f583e9d53cfa259343cdc0c2b76989acda\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 13 00:55:57.136167 env[1457]: time="2025-09-13T00:55:57.136109470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.8-n-0eeb704727,Uid:c842bb44a68058c513b6bb339b0a2e30,Namespace:kube-system,Attempt:0,} returns sandbox id \"0560ca519af39f1a38ce6abfdaf27dc1aa8b89739ac2093939a97ff227d60f40\"" Sep 13 00:55:57.140325 env[1457]: time="2025-09-13T00:55:57.140277563Z" level=info msg="CreateContainer within sandbox \"0560ca519af39f1a38ce6abfdaf27dc1aa8b89739ac2093939a97ff227d60f40\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 13 00:55:57.144140 env[1457]: time="2025-09-13T00:55:57.144097264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.8-n-0eeb704727,Uid:1bc5dcf4732a53e806bd4c8f34e11526,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f0bed99ad1f9a5296e26c18a2d6e2c4f36f0b7f13e5bc7e4ad9af2821291d40\"" Sep 13 00:55:57.144867 env[1457]: time="2025-09-13T00:55:57.144646950Z" level=info msg="CreateContainer within sandbox \"fe6b51ec61c472cb4f20ae56505622f583e9d53cfa259343cdc0c2b76989acda\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4c714dec53487f62666839dceed59eb30b6bad614d2af16151e611d6822dedd6\"" Sep 13 00:55:57.145560 env[1457]: time="2025-09-13T00:55:57.145374331Z" level=info msg="StartContainer for \"4c714dec53487f62666839dceed59eb30b6bad614d2af16151e611d6822dedd6\"" Sep 13 00:55:57.146445 env[1457]: time="2025-09-13T00:55:57.146416605Z" level=info msg="CreateContainer within sandbox \"2f0bed99ad1f9a5296e26c18a2d6e2c4f36f0b7f13e5bc7e4ad9af2821291d40\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 13 00:55:57.163014 systemd[1]: Started cri-containerd-4c714dec53487f62666839dceed59eb30b6bad614d2af16151e611d6822dedd6.scope. Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.178000 audit: BPF prog-id=68 op=LOAD Sep 13 00:55:57.179000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.179000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2176 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373134646563353334383766363236363638333964636565643539 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2176 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373134646563353334383766363236363638333964636565643539 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit: BPF prog-id=69 op=LOAD Sep 13 00:55:57.180000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c0240 items=0 ppid=2176 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373134646563353334383766363236363638333964636565643539 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.180000 audit: BPF prog-id=70 op=LOAD Sep 13 00:55:57.180000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c0288 items=0 ppid=2176 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373134646563353334383766363236363638333964636565643539 Sep 13 00:55:57.181000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:55:57.181000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.181000 audit: BPF prog-id=71 op=LOAD Sep 13 00:55:57.181000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c0698 items=0 ppid=2176 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373134646563353334383766363236363638333964636565643539 Sep 13 00:55:57.200998 env[1457]: time="2025-09-13T00:55:57.200963300Z" level=info msg="CreateContainer within sandbox \"0560ca519af39f1a38ce6abfdaf27dc1aa8b89739ac2093939a97ff227d60f40\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e8187605e4563fff0d5d323a22f8cd53246ca4dca5cf65d630b917ff457d0083\"" Sep 13 00:55:57.202356 env[1457]: time="2025-09-13T00:55:57.202315265Z" level=info msg="StartContainer for \"e8187605e4563fff0d5d323a22f8cd53246ca4dca5cf65d630b917ff457d0083\"" Sep 13 00:55:57.215111 env[1457]: time="2025-09-13T00:55:57.215066937Z" level=info msg="CreateContainer within sandbox \"2f0bed99ad1f9a5296e26c18a2d6e2c4f36f0b7f13e5bc7e4ad9af2821291d40\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"af3749353b5fe5cf0a0baac9d86a5f37a4e5c3b5d50c5c04123fe4b116e973e5\"" Sep 13 00:55:57.216661 env[1457]: time="2025-09-13T00:55:57.216631197Z" level=info msg="StartContainer for \"af3749353b5fe5cf0a0baac9d86a5f37a4e5c3b5d50c5c04123fe4b116e973e5\"" Sep 13 00:55:57.221866 env[1457]: time="2025-09-13T00:55:57.221834563Z" level=info msg="StartContainer for \"4c714dec53487f62666839dceed59eb30b6bad614d2af16151e611d6822dedd6\" returns successfully" Sep 13 00:55:57.228139 systemd[1]: Started cri-containerd-e8187605e4563fff0d5d323a22f8cd53246ca4dca5cf65d630b917ff457d0083.scope. Sep 13 00:55:57.247237 systemd[1]: Started cri-containerd-af3749353b5fe5cf0a0baac9d86a5f37a4e5c3b5d50c5c04123fe4b116e973e5.scope. Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.269000 audit: BPF prog-id=72 op=LOAD Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2224 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313837363035653435363366666630643564333233613232663863 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2224 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313837363035653435363366666630643564333233613232663863 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.270000 audit: BPF prog-id=73 op=LOAD Sep 13 00:55:57.270000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003970a0 items=0 ppid=2224 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313837363035653435363366666630643564333233613232663863 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.271000 audit: BPF prog-id=74 op=LOAD Sep 13 00:55:57.271000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003970e8 items=0 ppid=2224 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313837363035653435363366666630643564333233613232663863 Sep 13 00:55:57.272000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:55:57.272000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.272000 audit: BPF prog-id=75 op=LOAD Sep 13 00:55:57.272000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003974f8 items=0 ppid=2224 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313837363035653435363366666630643564333233613232663863 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.276000 audit: BPF prog-id=76 op=LOAD Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2192 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333734393335336235666535636630613062616163396438366135 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2192 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333734393335336235666535636630613062616163396438366135 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.277000 audit: BPF prog-id=77 op=LOAD Sep 13 00:55:57.277000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002931d0 items=0 ppid=2192 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333734393335336235666535636630613062616163396438366135 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.278000 audit: BPF prog-id=78 op=LOAD Sep 13 00:55:57.278000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000293218 items=0 ppid=2192 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333734393335336235666535636630613062616163396438366135 Sep 13 00:55:57.279000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:55:57.279000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:57.279000 audit: BPF prog-id=79 op=LOAD Sep 13 00:55:57.279000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000293628 items=0 ppid=2192 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:57.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333734393335336235666535636630613062616163396438366135 Sep 13 00:55:57.283398 kubelet[2135]: E0913 00:55:57.283244 2135 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.13:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.13:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.8-n-0eeb704727.1864b184c1e6e6e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.8-n-0eeb704727,UID:ci-3510.3.8-n-0eeb704727,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.8-n-0eeb704727,},FirstTimestamp:2025-09-13 00:55:38.328270564 +0000 UTC m=+0.974101169,LastTimestamp:2025-09-13 00:55:38.328270564 +0000 UTC m=+0.974101169,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.8-n-0eeb704727,}" Sep 13 00:55:57.339585 env[1457]: time="2025-09-13T00:55:57.339535732Z" level=info msg="StartContainer for \"af3749353b5fe5cf0a0baac9d86a5f37a4e5c3b5d50c5c04123fe4b116e973e5\" returns successfully" Sep 13 00:55:57.344765 env[1457]: time="2025-09-13T00:55:57.344718399Z" level=info msg="StartContainer for \"e8187605e4563fff0d5d323a22f8cd53246ca4dca5cf65d630b917ff457d0083\" returns successfully" Sep 13 00:55:57.380063 kubelet[2135]: W0913 00:55:57.379980 2135 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.13:6443: connect: connection refused Sep 13 00:55:57.380233 kubelet[2135]: E0913 00:55:57.380091 2135 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.13:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:55:57.623528 kubelet[2135]: E0913 00:55:57.623413 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:57.629652 kubelet[2135]: E0913 00:55:57.629623 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:57.633742 kubelet[2135]: E0913 00:55:57.633720 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:58.634123 kubelet[2135]: E0913 00:55:58.634091 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:58.634977 kubelet[2135]: E0913 00:55:58.634954 2135 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.289000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.289000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0006966f0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:55:59.289000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:59.289000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.289000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0001021c0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:55:59.289000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:59.339523 kubelet[2135]: I0913 00:55:59.338790 2135 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.376000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.376000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c005a840f0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:55:59.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:59.376000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.376000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c001c882a0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:55:59.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:59.381000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.381000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0087fde90 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:55:59.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:59.389000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7410 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.389000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c005a84690 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:55:59.389000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:59.421000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.421000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c003f3ff80 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:55:59.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:59.427000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:59.427000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c005a859e0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:55:59.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:59.435510 kubelet[2135]: E0913 00:55:59.435457 2135 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.8-n-0eeb704727\" not found" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.514173 kubelet[2135]: I0913 00:55:59.514135 2135 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.541624 kubelet[2135]: I0913 00:55:59.541282 2135 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.580861 kubelet[2135]: E0913 00:55:59.580649 2135 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.580861 kubelet[2135]: I0913 00:55:59.580682 2135 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.582699 kubelet[2135]: E0913 00:55:59.582508 2135 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.8-n-0eeb704727\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.582699 kubelet[2135]: I0913 00:55:59.582545 2135 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:55:59.584936 kubelet[2135]: E0913 00:55:59.584907 2135 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:00.327529 kubelet[2135]: I0913 00:56:00.327491 2135 apiserver.go:52] "Watching apiserver" Sep 13 00:56:00.340815 kubelet[2135]: I0913 00:56:00.340786 2135 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:56:00.401525 kubelet[2135]: I0913 00:56:00.401482 2135 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:00.432280 kubelet[2135]: W0913 00:56:00.432248 2135 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:56:02.048293 systemd[1]: Reloading. Sep 13 00:56:02.135688 /usr/lib/systemd/system-generators/torcx-generator[2426]: time="2025-09-13T00:56:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:56:02.135723 /usr/lib/systemd/system-generators/torcx-generator[2426]: time="2025-09-13T00:56:02Z" level=info msg="torcx already run" Sep 13 00:56:02.220915 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:56:02.220934 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:56:02.235450 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:56:02.325268 kernel: kauditd_printk_skb: 378 callbacks suppressed Sep 13 00:56:02.325397 kernel: audit: type=1400 audit(1757724962.305:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.347954 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:56:02.348070 kernel: audit: type=1400 audit(1757724962.305:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.348107 kernel: audit: audit_lost=43 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.366548 kernel: audit: type=1400 audit(1757724962.305:545): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.366630 kernel: audit: backlog limit exceeded Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.384249 kernel: audit: type=1400 audit(1757724962.305:546): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.384331 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407501 kernel: audit: type=1400 audit(1757724962.305:547): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407604 kernel: audit: audit_lost=44 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.323000 audit: BPF prog-id=80 op=LOAD Sep 13 00:56:02.323000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.324000 audit: BPF prog-id=81 op=LOAD Sep 13 00:56:02.324000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.325000 audit: BPF prog-id=82 op=LOAD Sep 13 00:56:02.325000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit: BPF prog-id=83 op=LOAD Sep 13 00:56:02.328000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit: BPF prog-id=84 op=LOAD Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.370000 audit: BPF prog-id=44 op=UNLOAD Sep 13 00:56:02.370000 audit: BPF prog-id=45 op=UNLOAD Sep 13 00:56:02.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit: BPF prog-id=87 op=LOAD Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.407000 audit: BPF prog-id=88 op=LOAD Sep 13 00:56:02.407000 audit: BPF prog-id=47 op=UNLOAD Sep 13 00:56:02.407000 audit: BPF prog-id=48 op=UNLOAD Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.408000 audit: BPF prog-id=89 op=LOAD Sep 13 00:56:02.408000 audit: BPF prog-id=49 op=UNLOAD Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit: BPF prog-id=90 op=LOAD Sep 13 00:56:02.409000 audit: BPF prog-id=50 op=UNLOAD Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit: BPF prog-id=91 op=LOAD Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.409000 audit: BPF prog-id=92 op=LOAD Sep 13 00:56:02.410000 audit: BPF prog-id=51 op=UNLOAD Sep 13 00:56:02.410000 audit: BPF prog-id=52 op=UNLOAD Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.410000 audit: BPF prog-id=93 op=LOAD Sep 13 00:56:02.410000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:56:02.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit: BPF prog-id=94 op=LOAD Sep 13 00:56:02.412000 audit: BPF prog-id=53 op=UNLOAD Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit: BPF prog-id=95 op=LOAD Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit: BPF prog-id=96 op=LOAD Sep 13 00:56:02.412000 audit: BPF prog-id=54 op=UNLOAD Sep 13 00:56:02.412000 audit: BPF prog-id=55 op=UNLOAD Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.412000 audit: BPF prog-id=97 op=LOAD Sep 13 00:56:02.413000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.413000 audit: BPF prog-id=98 op=LOAD Sep 13 00:56:02.413000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.415000 audit: BPF prog-id=99 op=LOAD Sep 13 00:56:02.415000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:02.417000 audit: BPF prog-id=100 op=LOAD Sep 13 00:56:02.417000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:56:02.433052 systemd[1]: Stopping kubelet.service... Sep 13 00:56:02.451801 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:56:02.452028 systemd[1]: Stopped kubelet.service. Sep 13 00:56:02.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:02.452099 systemd[1]: kubelet.service: Consumed 1.406s CPU time. Sep 13 00:56:02.453935 systemd[1]: Starting kubelet.service... Sep 13 00:56:02.586321 systemd[1]: Started kubelet.service. Sep 13 00:56:02.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:03.229648 kubelet[2493]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:56:03.229648 kubelet[2493]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:56:03.229648 kubelet[2493]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:56:03.229648 kubelet[2493]: I0913 00:56:03.228911 2493 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:56:03.237084 kubelet[2493]: I0913 00:56:03.237056 2493 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 00:56:03.237269 kubelet[2493]: I0913 00:56:03.237257 2493 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:56:03.237939 kubelet[2493]: I0913 00:56:03.237921 2493 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 00:56:03.239742 kubelet[2493]: I0913 00:56:03.239716 2493 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Sep 13 00:56:03.242451 kubelet[2493]: I0913 00:56:03.242434 2493 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:56:03.250478 kubelet[2493]: E0913 00:56:03.250425 2493 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:56:03.250654 kubelet[2493]: I0913 00:56:03.250640 2493 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:56:03.257140 kubelet[2493]: I0913 00:56:03.257118 2493 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:56:03.257362 kubelet[2493]: I0913 00:56:03.257337 2493 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:56:03.257609 kubelet[2493]: I0913 00:56:03.257365 2493 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.8-n-0eeb704727","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:56:03.257738 kubelet[2493]: I0913 00:56:03.257620 2493 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:56:03.257738 kubelet[2493]: I0913 00:56:03.257634 2493 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 00:56:03.257738 kubelet[2493]: I0913 00:56:03.257684 2493 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:56:03.257845 kubelet[2493]: I0913 00:56:03.257826 2493 kubelet.go:446] "Attempting to sync node with API server" Sep 13 00:56:03.257889 kubelet[2493]: I0913 00:56:03.257849 2493 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:56:03.257889 kubelet[2493]: I0913 00:56:03.257872 2493 kubelet.go:352] "Adding apiserver pod source" Sep 13 00:56:03.257889 kubelet[2493]: I0913 00:56:03.257883 2493 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:56:03.260000 audit[2493]: AVC avc: denied { mac_admin } for pid=2493 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:03.260000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:56:03.260000 audit[2493]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005a4630 a1=c0007e5c38 a2=c0005a4570 a3=25 items=0 ppid=1 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:03.260000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:56:03.261000 audit[2493]: AVC avc: denied { mac_admin } for pid=2493 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:03.261000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:56:03.261000 audit[2493]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00027fca0 a1=c0007e5c50 a2=c0005a4d50 a3=25 items=0 ppid=1 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:03.261000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.259420 2493 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.259955 2493 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.260408 2493 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.260435 2493 server.go:1287] "Started kubelet" Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.262520 2493 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.262587 2493 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:56:03.265714 kubelet[2493]: I0913 00:56:03.262626 2493 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:56:03.280724 kubelet[2493]: I0913 00:56:03.280677 2493 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:56:03.281763 kubelet[2493]: I0913 00:56:03.281736 2493 server.go:479] "Adding debug handlers to kubelet server" Sep 13 00:56:03.283149 kubelet[2493]: I0913 00:56:03.283102 2493 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:56:03.283309 kubelet[2493]: I0913 00:56:03.283290 2493 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:56:03.285410 kubelet[2493]: I0913 00:56:03.285184 2493 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:56:03.287709 kubelet[2493]: I0913 00:56:03.286809 2493 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:56:03.287709 kubelet[2493]: E0913 00:56:03.287395 2493 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-0eeb704727\" not found" Sep 13 00:56:03.293019 kubelet[2493]: I0913 00:56:03.288453 2493 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:56:03.293019 kubelet[2493]: I0913 00:56:03.288576 2493 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:56:03.301505 kubelet[2493]: I0913 00:56:03.300582 2493 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:56:03.301505 kubelet[2493]: I0913 00:56:03.300693 2493 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:56:03.305299 kubelet[2493]: I0913 00:56:03.304645 2493 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:56:03.309480 kubelet[2493]: I0913 00:56:03.309046 2493 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:56:03.310478 kubelet[2493]: E0913 00:56:03.310101 2493 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:56:03.313155 kubelet[2493]: I0913 00:56:03.312879 2493 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:56:03.313155 kubelet[2493]: I0913 00:56:03.312907 2493 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 00:56:03.313155 kubelet[2493]: I0913 00:56:03.312927 2493 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:56:03.313155 kubelet[2493]: I0913 00:56:03.312936 2493 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 00:56:03.313155 kubelet[2493]: E0913 00:56:03.312981 2493 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:56:03.367052 kubelet[2493]: I0913 00:56:03.367025 2493 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:56:03.367052 kubelet[2493]: I0913 00:56:03.367041 2493 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:56:03.367052 kubelet[2493]: I0913 00:56:03.367061 2493 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:56:03.367277 kubelet[2493]: I0913 00:56:03.367224 2493 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 13 00:56:03.367277 kubelet[2493]: I0913 00:56:03.367236 2493 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 13 00:56:03.367277 kubelet[2493]: I0913 00:56:03.367265 2493 policy_none.go:49] "None policy: Start" Sep 13 00:56:03.367277 kubelet[2493]: I0913 00:56:03.367276 2493 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:56:03.367418 kubelet[2493]: I0913 00:56:03.367287 2493 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:56:03.367418 kubelet[2493]: I0913 00:56:03.367414 2493 state_mem.go:75] "Updated machine memory state" Sep 13 00:56:03.372724 kubelet[2493]: I0913 00:56:03.372699 2493 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:56:03.371000 audit[2493]: AVC avc: denied { mac_admin } for pid=2493 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:03.371000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:56:03.371000 audit[2493]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005a5bf0 a1=c00109e750 a2=c0005a5bc0 a3=25 items=0 ppid=1 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:03.371000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:56:03.377127 kubelet[2493]: I0913 00:56:03.372763 2493 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:56:03.377127 kubelet[2493]: I0913 00:56:03.372910 2493 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:56:03.377127 kubelet[2493]: I0913 00:56:03.372923 2493 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:56:03.377127 kubelet[2493]: I0913 00:56:03.373431 2493 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:56:03.377127 kubelet[2493]: E0913 00:56:03.374870 2493 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:56:03.413864 kubelet[2493]: I0913 00:56:03.413839 2493 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.414417 kubelet[2493]: I0913 00:56:03.414403 2493 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.417204 kubelet[2493]: I0913 00:56:03.414746 2493 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.419865 kubelet[2493]: W0913 00:56:03.419588 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:56:03.425613 kubelet[2493]: W0913 00:56:03.425572 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:56:03.428234 kubelet[2493]: W0913 00:56:03.428213 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:56:03.428320 kubelet[2493]: E0913 00:56:03.428264 2493 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.475952 kubelet[2493]: I0913 00:56:03.475911 2493 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.489824 kubelet[2493]: I0913 00:56:03.489733 2493 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.489824 kubelet[2493]: I0913 00:56:03.489810 2493 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.589956 kubelet[2493]: I0913 00:56:03.589921 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1bc5dcf4732a53e806bd4c8f34e11526-kubeconfig\") pod \"kube-scheduler-ci-3510.3.8-n-0eeb704727\" (UID: \"1bc5dcf4732a53e806bd4c8f34e11526\") " pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590174 kubelet[2493]: I0913 00:56:03.590151 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c842bb44a68058c513b6bb339b0a2e30-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" (UID: \"c842bb44a68058c513b6bb339b0a2e30\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590270 kubelet[2493]: I0913 00:56:03.590255 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-ca-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590367 kubelet[2493]: I0913 00:56:03.590353 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590468 kubelet[2493]: I0913 00:56:03.590454 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590600 kubelet[2493]: I0913 00:56:03.590584 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590688 kubelet[2493]: I0913 00:56:03.590674 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c842bb44a68058c513b6bb339b0a2e30-ca-certs\") pod \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" (UID: \"c842bb44a68058c513b6bb339b0a2e30\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590776 kubelet[2493]: I0913 00:56:03.590762 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c842bb44a68058c513b6bb339b0a2e30-k8s-certs\") pod \"kube-apiserver-ci-3510.3.8-n-0eeb704727\" (UID: \"c842bb44a68058c513b6bb339b0a2e30\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:03.590865 kubelet[2493]: I0913 00:56:03.590851 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/95e314810a5a44f490c8f33ac93a09fa-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.8-n-0eeb704727\" (UID: \"95e314810a5a44f490c8f33ac93a09fa\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:04.258722 kubelet[2493]: I0913 00:56:04.258690 2493 apiserver.go:52] "Watching apiserver" Sep 13 00:56:04.289353 kubelet[2493]: I0913 00:56:04.289316 2493 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:56:04.358776 kubelet[2493]: I0913 00:56:04.358752 2493 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:04.366698 kubelet[2493]: W0913 00:56:04.366676 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 13 00:56:04.366887 kubelet[2493]: E0913 00:56:04.366864 2493 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.8-n-0eeb704727\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" Sep 13 00:56:04.390268 kubelet[2493]: I0913 00:56:04.390199 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.8-n-0eeb704727" podStartSLOduration=1.390179273 podStartE2EDuration="1.390179273s" podCreationTimestamp="2025-09-13 00:56:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:56:04.380795681 +0000 UTC m=+1.789063845" watchObservedRunningTime="2025-09-13 00:56:04.390179273 +0000 UTC m=+1.798447537" Sep 13 00:56:04.400705 kubelet[2493]: I0913 00:56:04.400124 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.8-n-0eeb704727" podStartSLOduration=1.400103352 podStartE2EDuration="1.400103352s" podCreationTimestamp="2025-09-13 00:56:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:56:04.390676362 +0000 UTC m=+1.798944526" watchObservedRunningTime="2025-09-13 00:56:04.400103352 +0000 UTC m=+1.808371616" Sep 13 00:56:04.400705 kubelet[2493]: I0913 00:56:04.400233 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-0eeb704727" podStartSLOduration=4.40022515 podStartE2EDuration="4.40022515s" podCreationTimestamp="2025-09-13 00:56:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:56:04.39973776 +0000 UTC m=+1.808005924" watchObservedRunningTime="2025-09-13 00:56:04.40022515 +0000 UTC m=+1.808493314" Sep 13 00:56:05.165000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.165000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b065c0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:05.165000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b06780 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b06940 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:05.167000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.167000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c5e0c0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:05.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:06.265000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7435 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:56:06.265000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ec1b80 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:06.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:08.225813 kubelet[2493]: I0913 00:56:08.225773 2493 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 13 00:56:08.226252 env[1457]: time="2025-09-13T00:56:08.226188226Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:56:08.226562 kubelet[2493]: I0913 00:56:08.226425 2493 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 13 00:56:08.949869 systemd[1]: Created slice kubepods-besteffort-podf9dd99ca_f06e_4aff_b8d4_06ed113dec58.slice. Sep 13 00:56:09.019527 kubelet[2493]: I0913 00:56:09.019479 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f9dd99ca-f06e-4aff-b8d4-06ed113dec58-xtables-lock\") pod \"kube-proxy-rn5vx\" (UID: \"f9dd99ca-f06e-4aff-b8d4-06ed113dec58\") " pod="kube-system/kube-proxy-rn5vx" Sep 13 00:56:09.019527 kubelet[2493]: I0913 00:56:09.019529 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f9dd99ca-f06e-4aff-b8d4-06ed113dec58-lib-modules\") pod \"kube-proxy-rn5vx\" (UID: \"f9dd99ca-f06e-4aff-b8d4-06ed113dec58\") " pod="kube-system/kube-proxy-rn5vx" Sep 13 00:56:09.019705 kubelet[2493]: I0913 00:56:09.019554 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f9dd99ca-f06e-4aff-b8d4-06ed113dec58-kube-proxy\") pod \"kube-proxy-rn5vx\" (UID: \"f9dd99ca-f06e-4aff-b8d4-06ed113dec58\") " pod="kube-system/kube-proxy-rn5vx" Sep 13 00:56:09.019705 kubelet[2493]: I0913 00:56:09.019578 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6gcwq\" (UniqueName: \"kubernetes.io/projected/f9dd99ca-f06e-4aff-b8d4-06ed113dec58-kube-api-access-6gcwq\") pod \"kube-proxy-rn5vx\" (UID: \"f9dd99ca-f06e-4aff-b8d4-06ed113dec58\") " pod="kube-system/kube-proxy-rn5vx" Sep 13 00:56:09.125354 kubelet[2493]: I0913 00:56:09.125322 2493 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:56:09.208909 systemd[1]: Created slice kubepods-besteffort-pod8ed2c819_10be_49ff_8931_1fe3d8d7715f.slice. Sep 13 00:56:09.221014 kubelet[2493]: I0913 00:56:09.220982 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-26gkf\" (UniqueName: \"kubernetes.io/projected/8ed2c819-10be-49ff-8931-1fe3d8d7715f-kube-api-access-26gkf\") pod \"tigera-operator-755d956888-qw7zd\" (UID: \"8ed2c819-10be-49ff-8931-1fe3d8d7715f\") " pod="tigera-operator/tigera-operator-755d956888-qw7zd" Sep 13 00:56:09.221014 kubelet[2493]: I0913 00:56:09.221024 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8ed2c819-10be-49ff-8931-1fe3d8d7715f-var-lib-calico\") pod \"tigera-operator-755d956888-qw7zd\" (UID: \"8ed2c819-10be-49ff-8931-1fe3d8d7715f\") " pod="tigera-operator/tigera-operator-755d956888-qw7zd" Sep 13 00:56:09.259202 env[1457]: time="2025-09-13T00:56:09.258756464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rn5vx,Uid:f9dd99ca-f06e-4aff-b8d4-06ed113dec58,Namespace:kube-system,Attempt:0,}" Sep 13 00:56:09.293367 env[1457]: time="2025-09-13T00:56:09.293185172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:09.293367 env[1457]: time="2025-09-13T00:56:09.293223871Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:09.293367 env[1457]: time="2025-09-13T00:56:09.293234071Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:09.293622 env[1457]: time="2025-09-13T00:56:09.293397968Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab3a646b25c94ce3aedd04d3a634f49f6eecbf88ebe0a7c113829a192b9df58b pid=2544 runtime=io.containerd.runc.v2 Sep 13 00:56:09.313591 systemd[1]: Started cri-containerd-ab3a646b25c94ce3aedd04d3a634f49f6eecbf88ebe0a7c113829a192b9df58b.scope. Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.332481 kernel: kauditd_printk_skb: 285 callbacks suppressed Sep 13 00:56:09.332576 kernel: audit: type=1400 audit(1757724969.327:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358990 kernel: audit: type=1400 audit(1757724969.327:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.393396 kernel: audit: type=1400 audit(1757724969.327:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.393523 kernel: audit: type=1400 audit(1757724969.327:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.409538 kernel: audit: type=1400 audit(1757724969.327:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.435324 env[1457]: time="2025-09-13T00:56:09.435283415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rn5vx,Uid:f9dd99ca-f06e-4aff-b8d4-06ed113dec58,Namespace:kube-system,Attempt:0,} returns sandbox id \"ab3a646b25c94ce3aedd04d3a634f49f6eecbf88ebe0a7c113829a192b9df58b\"" Sep 13 00:56:09.436560 kernel: audit: type=1400 audit(1757724969.327:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.436627 kernel: audit: type=1400 audit(1757724969.327:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.443630 env[1457]: time="2025-09-13T00:56:09.439892323Z" level=info msg="CreateContainer within sandbox \"ab3a646b25c94ce3aedd04d3a634f49f6eecbf88ebe0a7c113829a192b9df58b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:56:09.449865 kernel: audit: type=1400 audit(1757724969.327:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.462549 kernel: audit: type=1400 audit(1757724969.327:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.475702 kernel: audit: type=1400 audit(1757724969.327:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.327000 audit: BPF prog-id=101 op=LOAD Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2544 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336136343662323563393463653361656464303464336136333466 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2544 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336136343662323563393463653361656464303464336136333466 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.343000 audit: BPF prog-id=102 op=LOAD Sep 13 00:56:09.343000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000214ce0 items=0 ppid=2544 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336136343662323563393463653361656464303464336136333466 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.345000 audit: BPF prog-id=103 op=LOAD Sep 13 00:56:09.345000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000214d28 items=0 ppid=2544 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336136343662323563393463653361656464303464336136333466 Sep 13 00:56:09.358000 audit: BPF prog-id=103 op=UNLOAD Sep 13 00:56:09.358000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.358000 audit: BPF prog-id=104 op=LOAD Sep 13 00:56:09.358000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000215138 items=0 ppid=2544 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336136343662323563393463653361656464303464336136333466 Sep 13 00:56:09.498816 env[1457]: time="2025-09-13T00:56:09.498773339Z" level=info msg="CreateContainer within sandbox \"ab3a646b25c94ce3aedd04d3a634f49f6eecbf88ebe0a7c113829a192b9df58b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b7f9d92a4248d4157d5de6a36d4070cc3cf01ede6d10439c7552d2807b3c8aec\"" Sep 13 00:56:09.499386 env[1457]: time="2025-09-13T00:56:09.499356027Z" level=info msg="StartContainer for \"b7f9d92a4248d4157d5de6a36d4070cc3cf01ede6d10439c7552d2807b3c8aec\"" Sep 13 00:56:09.516045 systemd[1]: Started cri-containerd-b7f9d92a4248d4157d5de6a36d4070cc3cf01ede6d10439c7552d2807b3c8aec.scope. Sep 13 00:56:09.518742 env[1457]: time="2025-09-13T00:56:09.517489663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-qw7zd,Uid:8ed2c819-10be-49ff-8931-1fe3d8d7715f,Namespace:tigera-operator,Attempt:0,}" Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f49080f81e8 items=0 ppid=2544 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964393261343234386434313537643564653661333664343037 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit: BPF prog-id=105 op=LOAD Sep 13 00:56:09.534000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001edfa8 items=0 ppid=2544 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964393261343234386434313537643564653661333664343037 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit: BPF prog-id=106 op=LOAD Sep 13 00:56:09.534000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001edff8 items=0 ppid=2544 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964393261343234386434313537643564653661333664343037 Sep 13 00:56:09.534000 audit: BPF prog-id=106 op=UNLOAD Sep 13 00:56:09.534000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.534000 audit: BPF prog-id=107 op=LOAD Sep 13 00:56:09.534000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00035a088 items=0 ppid=2544 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964393261343234386434313537643564653661333664343037 Sep 13 00:56:09.553202 env[1457]: time="2025-09-13T00:56:09.553168345Z" level=info msg="StartContainer for \"b7f9d92a4248d4157d5de6a36d4070cc3cf01ede6d10439c7552d2807b3c8aec\" returns successfully" Sep 13 00:56:09.562949 env[1457]: time="2025-09-13T00:56:09.562760353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:09.562949 env[1457]: time="2025-09-13T00:56:09.562803052Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:09.562949 env[1457]: time="2025-09-13T00:56:09.562819651Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:09.563219 env[1457]: time="2025-09-13T00:56:09.563159945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5eacd92792fd0682320daf4fac92748273b13a28a940583c242f7518649af23e pid=2619 runtime=io.containerd.runc.v2 Sep 13 00:56:09.576875 systemd[1]: Started cri-containerd-5eacd92792fd0682320daf4fac92748273b13a28a940583c242f7518649af23e.scope. Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit: BPF prog-id=108 op=LOAD Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565616364393237393266643036383233323064616634666163393237 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565616364393237393266643036383233323064616634666163393237 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit: BPF prog-id=109 op=LOAD Sep 13 00:56:09.610000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002daee0 items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565616364393237393266643036383233323064616634666163393237 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit: BPF prog-id=110 op=LOAD Sep 13 00:56:09.610000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002daf28 items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565616364393237393266643036383233323064616634666163393237 Sep 13 00:56:09.610000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:56:09.610000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:09.610000 audit: BPF prog-id=111 op=LOAD Sep 13 00:56:09.610000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002db338 items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565616364393237393266643036383233323064616634666163393237 Sep 13 00:56:09.644076 env[1457]: time="2025-09-13T00:56:09.644034519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-qw7zd,Uid:8ed2c819-10be-49ff-8931-1fe3d8d7715f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5eacd92792fd0682320daf4fac92748273b13a28a940583c242f7518649af23e\"" Sep 13 00:56:09.646566 env[1457]: time="2025-09-13T00:56:09.646169376Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 13 00:56:09.709000 audit[2686]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.709000 audit[2687]: NETFILTER_CFG table=mangle:46 family=10 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.709000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9a5e8cb0 a2=0 a3=7ffd9a5e8c9c items=0 ppid=2597 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:56:09.709000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc13752ee0 a2=0 a3=7ffc13752ecc items=0 ppid=2597 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:56:09.711000 audit[2689]: NETFILTER_CFG table=nat:47 family=10 entries=1 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.711000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe25fee980 a2=0 a3=7ffe25fee96c items=0 ppid=2597 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:56:09.712000 audit[2690]: NETFILTER_CFG table=nat:48 family=2 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.712000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe41e04290 a2=0 a3=7ffe41e0427c items=0 ppid=2597 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:56:09.713000 audit[2692]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.713000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd603c16a0 a2=0 a3=7ffd603c168c items=0 ppid=2597 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:56:09.717000 audit[2691]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.717000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc6f5af10 a2=0 a3=7fffc6f5aefc items=0 ppid=2597 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:56:09.816000 audit[2693]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.816000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe508cc5c0 a2=0 a3=7ffe508cc5ac items=0 ppid=2597 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:56:09.819000 audit[2695]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.819000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe5b3fa2c0 a2=0 a3=7ffe5b3fa2ac items=0 ppid=2597 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:56:09.823000 audit[2698]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.823000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd5465ab10 a2=0 a3=7ffd5465aafc items=0 ppid=2597 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:56:09.824000 audit[2699]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.824000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc002c0070 a2=0 a3=7ffc002c005c items=0 ppid=2597 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:56:09.827000 audit[2701]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.827000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf9e13ea0 a2=0 a3=7ffcf9e13e8c items=0 ppid=2597 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:56:09.828000 audit[2702]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.828000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe65815870 a2=0 a3=7ffe6581585c items=0 ppid=2597 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:56:09.830000 audit[2704]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.830000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc94c59310 a2=0 a3=7ffc94c592fc items=0 ppid=2597 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:56:09.834000 audit[2707]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.834000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd8324ecb0 a2=0 a3=7ffd8324ec9c items=0 ppid=2597 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:56:09.835000 audit[2708]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.835000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff868145a0 a2=0 a3=7fff8681458c items=0 ppid=2597 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:56:09.838000 audit[2710]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.838000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf3801150 a2=0 a3=7ffdf380113c items=0 ppid=2597 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:56:09.840000 audit[2711]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.840000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6b4ef00 a2=0 a3=7ffeb6b4eeec items=0 ppid=2597 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:56:09.843000 audit[2713]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.843000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3e6fbb40 a2=0 a3=7ffd3e6fbb2c items=0 ppid=2597 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:56:09.847000 audit[2716]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.847000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe547fd9f0 a2=0 a3=7ffe547fd9dc items=0 ppid=2597 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:56:09.852000 audit[2719]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.852000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7e959de0 a2=0 a3=7ffe7e959dcc items=0 ppid=2597 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:56:09.853000 audit[2720]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.853000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1b0ead50 a2=0 a3=7fff1b0ead3c items=0 ppid=2597 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:56:09.856000 audit[2722]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.856000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe0625cd60 a2=0 a3=7ffe0625cd4c items=0 ppid=2597 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:56:09.859000 audit[2725]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_rule pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.859000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe15e0d880 a2=0 a3=7ffe15e0d86c items=0 ppid=2597 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:56:09.861000 audit[2726]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.861000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8a032b10 a2=0 a3=7ffd8a032afc items=0 ppid=2597 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:56:09.863000 audit[2728]: NETFILTER_CFG table=nat:69 family=2 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:56:09.863000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffca68992b0 a2=0 a3=7ffca689929c items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:56:09.904000 audit[2734]: NETFILTER_CFG table=filter:70 family=2 entries=8 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:09.904000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffaca95dd0 a2=0 a3=7fffaca95dbc items=0 ppid=2597 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.904000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:09.919000 audit[2734]: NETFILTER_CFG table=nat:71 family=2 entries=14 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:09.919000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffaca95dd0 a2=0 a3=7fffaca95dbc items=0 ppid=2597 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:09.921000 audit[2739]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.921000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffecae854d0 a2=0 a3=7ffecae854bc items=0 ppid=2597 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:56:09.924000 audit[2741]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.924000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd77aaf00 a2=0 a3=7ffcd77aaeec items=0 ppid=2597 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:56:09.928000 audit[2744]: NETFILTER_CFG table=filter:74 family=10 entries=2 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.928000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd86497230 a2=0 a3=7ffd8649721c items=0 ppid=2597 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:56:09.929000 audit[2745]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.929000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4c417480 a2=0 a3=7ffd4c41746c items=0 ppid=2597 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:56:09.931000 audit[2747]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.931000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef685e860 a2=0 a3=7ffef685e84c items=0 ppid=2597 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.931000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:56:09.932000 audit[2748]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.932000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd284fae90 a2=0 a3=7ffd284fae7c items=0 ppid=2597 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.932000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:56:09.935000 audit[2750]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.935000 audit[2750]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc46960c10 a2=0 a3=7ffc46960bfc items=0 ppid=2597 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:56:09.938000 audit[2753]: NETFILTER_CFG table=filter:79 family=10 entries=2 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.938000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb045e7e0 a2=0 a3=7ffcb045e7cc items=0 ppid=2597 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:56:09.939000 audit[2754]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.939000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc57f58980 a2=0 a3=7ffc57f5896c items=0 ppid=2597 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:56:09.942000 audit[2756]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.942000 audit[2756]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec0a32fc0 a2=0 a3=7ffec0a32fac items=0 ppid=2597 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:56:09.943000 audit[2757]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.943000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff498eea80 a2=0 a3=7fff498eea6c items=0 ppid=2597 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:56:09.945000 audit[2759]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.945000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd29854b10 a2=0 a3=7ffd29854afc items=0 ppid=2597 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:56:09.949000 audit[2762]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.949000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5198a310 a2=0 a3=7ffc5198a2fc items=0 ppid=2597 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:56:09.953000 audit[2765]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.953000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff27d6f5c0 a2=0 a3=7fff27d6f5ac items=0 ppid=2597 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:56:09.954000 audit[2766]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.954000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec74335c0 a2=0 a3=7ffec74335ac items=0 ppid=2597 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:56:09.956000 audit[2768]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.956000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffefc7a8290 a2=0 a3=7ffefc7a827c items=0 ppid=2597 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:56:09.960000 audit[2771]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.960000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff554d49a0 a2=0 a3=7fff554d498c items=0 ppid=2597 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:56:09.961000 audit[2772]: NETFILTER_CFG table=nat:89 family=10 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.961000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe40063420 a2=0 a3=7ffe4006340c items=0 ppid=2597 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:56:09.963000 audit[2774]: NETFILTER_CFG table=nat:90 family=10 entries=2 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.963000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda6ac1140 a2=0 a3=7ffda6ac112c items=0 ppid=2597 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:56:09.966000 audit[2775]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.966000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcbd78890 a2=0 a3=7fffcbd7887c items=0 ppid=2597 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:56:09.969000 audit[2777]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.969000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd15ead70 a2=0 a3=7ffcd15ead5c items=0 ppid=2597 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:56:09.972000 audit[2780]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:56:09.972000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe848879d0 a2=0 a3=7ffe848879bc items=0 ppid=2597 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:56:09.979000 audit[2783]: NETFILTER_CFG table=filter:94 family=10 entries=3 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:56:09.979000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffa80a8ee0 a2=0 a3=7fffa80a8ecc items=0 ppid=2597 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.979000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:09.979000 audit[2783]: NETFILTER_CFG table=nat:95 family=10 entries=7 op=nft_register_chain pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:56:09.979000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffa80a8ee0 a2=0 a3=7fffa80a8ecc items=0 ppid=2597 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:09.979000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:10.381489 kubelet[2493]: I0913 00:56:10.381365 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rn5vx" podStartSLOduration=2.381349941 podStartE2EDuration="2.381349941s" podCreationTimestamp="2025-09-13 00:56:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:56:10.381161245 +0000 UTC m=+7.789429409" watchObservedRunningTime="2025-09-13 00:56:10.381349941 +0000 UTC m=+7.789618105" Sep 13 00:56:11.343407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2985822162.mount: Deactivated successfully. Sep 13 00:56:12.465012 env[1457]: time="2025-09-13T00:56:12.464962350Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:12.476239 env[1457]: time="2025-09-13T00:56:12.476205937Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:12.480245 env[1457]: time="2025-09-13T00:56:12.480212861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:12.487237 env[1457]: time="2025-09-13T00:56:12.487208428Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:12.487722 env[1457]: time="2025-09-13T00:56:12.487692519Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 13 00:56:12.490758 env[1457]: time="2025-09-13T00:56:12.490160772Z" level=info msg="CreateContainer within sandbox \"5eacd92792fd0682320daf4fac92748273b13a28a940583c242f7518649af23e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 13 00:56:12.522475 env[1457]: time="2025-09-13T00:56:12.522431859Z" level=info msg="CreateContainer within sandbox \"5eacd92792fd0682320daf4fac92748273b13a28a940583c242f7518649af23e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c31f4bc748d64bc83968802044ff0a93b9d89c9e4cab4bac1c0819365430e5fa\"" Sep 13 00:56:12.522982 env[1457]: time="2025-09-13T00:56:12.522953149Z" level=info msg="StartContainer for \"c31f4bc748d64bc83968802044ff0a93b9d89c9e4cab4bac1c0819365430e5fa\"" Sep 13 00:56:12.548883 systemd[1]: Started cri-containerd-c31f4bc748d64bc83968802044ff0a93b9d89c9e4cab4bac1c0819365430e5fa.scope. Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit: BPF prog-id=112 op=LOAD Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2619 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:12.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316634626337343864363462633833393638383032303434666630 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2619 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:12.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316634626337343864363462633833393638383032303434666630 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.560000 audit: BPF prog-id=113 op=LOAD Sep 13 00:56:12.560000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a5ec0 items=0 ppid=2619 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:12.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316634626337343864363462633833393638383032303434666630 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.561000 audit: BPF prog-id=114 op=LOAD Sep 13 00:56:12.561000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a5f08 items=0 ppid=2619 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:12.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316634626337343864363462633833393638383032303434666630 Sep 13 00:56:12.562000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:56:12.562000 audit: BPF prog-id=113 op=UNLOAD Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:12.562000 audit: BPF prog-id=115 op=LOAD Sep 13 00:56:12.562000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002dc318 items=0 ppid=2619 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:12.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316634626337343864363462633833393638383032303434666630 Sep 13 00:56:12.584064 env[1457]: time="2025-09-13T00:56:12.584000589Z" level=info msg="StartContainer for \"c31f4bc748d64bc83968802044ff0a93b9d89c9e4cab4bac1c0819365430e5fa\" returns successfully" Sep 13 00:56:13.388909 kubelet[2493]: I0913 00:56:13.388825 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-755d956888-qw7zd" podStartSLOduration=1.545396628 podStartE2EDuration="4.388805734s" podCreationTimestamp="2025-09-13 00:56:09 +0000 UTC" firstStartedPulling="2025-09-13 00:56:09.645426791 +0000 UTC m=+7.053695055" lastFinishedPulling="2025-09-13 00:56:12.488835997 +0000 UTC m=+9.897104161" observedRunningTime="2025-09-13 00:56:13.388605438 +0000 UTC m=+10.796873602" watchObservedRunningTime="2025-09-13 00:56:13.388805734 +0000 UTC m=+10.797073898" Sep 13 00:56:13.510809 systemd[1]: run-containerd-runc-k8s.io-c31f4bc748d64bc83968802044ff0a93b9d89c9e4cab4bac1c0819365430e5fa-runc.GcQQOe.mount: Deactivated successfully. Sep 13 00:56:18.927727 sudo[1861]: pam_unix(sudo:session): session closed for user root Sep 13 00:56:18.952825 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 13 00:56:18.952959 kernel: audit: type=1106 audit(1757724978.927:897): pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:56:18.927000 audit[1861]: USER_END pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:56:18.954000 audit[1861]: CRED_DISP pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:56:18.984970 kernel: audit: type=1104 audit(1757724978.954:898): pid=1861 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:56:19.060770 sshd[1858]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:19.062000 audit[1858]: USER_END pid=1858 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:19.064499 systemd-logind[1435]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:56:19.065335 systemd[1]: sshd@6-10.200.4.13:22-10.200.16.10:38478.service: Deactivated successfully. Sep 13 00:56:19.065984 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:56:19.066108 systemd[1]: session-9.scope: Consumed 4.086s CPU time. Sep 13 00:56:19.067083 systemd-logind[1435]: Removed session 9. Sep 13 00:56:19.062000 audit[1858]: CRED_DISP pid=1858 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:19.104353 kernel: audit: type=1106 audit(1757724979.062:899): pid=1858 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:19.104486 kernel: audit: type=1104 audit(1757724979.062:900): pid=1858 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:19.104530 kernel: audit: type=1131 audit(1757724979.062:901): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.13:22-10.200.16.10:38478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:19.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.13:22-10.200.16.10:38478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:20.319000 audit[2868]: NETFILTER_CFG table=filter:96 family=2 entries=15 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:20.331661 kernel: audit: type=1325 audit(1757724980.319:902): table=filter:96 family=2 entries=15 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:20.319000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffe007d5f0 a2=0 a3=7fffe007d5dc items=0 ppid=2597 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:20.356542 kernel: audit: type=1300 audit(1757724980.319:902): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffe007d5f0 a2=0 a3=7fffe007d5dc items=0 ppid=2597 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:20.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:20.371538 kernel: audit: type=1327 audit(1757724980.319:902): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:20.369000 audit[2868]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:20.385531 kernel: audit: type=1325 audit(1757724980.369:903): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:20.369000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe007d5f0 a2=0 a3=0 items=0 ppid=2597 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:20.414533 kernel: audit: type=1300 audit(1757724980.369:903): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe007d5f0 a2=0 a3=0 items=0 ppid=2597 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:20.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:20.443000 audit[2870]: NETFILTER_CFG table=filter:98 family=2 entries=16 op=nft_register_rule pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:20.443000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffff74802f0 a2=0 a3=7ffff74802dc items=0 ppid=2597 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:20.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:20.451000 audit[2870]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:20.451000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff74802f0 a2=0 a3=0 items=0 ppid=2597 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:20.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.436000 audit[2872]: NETFILTER_CFG table=filter:100 family=2 entries=17 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.441944 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 13 00:56:24.442041 kernel: audit: type=1325 audit(1757724984.436:906): table=filter:100 family=2 entries=17 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.436000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcba256a80 a2=0 a3=7ffcba256a6c items=0 ppid=2597 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.473168 kernel: audit: type=1300 audit(1757724984.436:906): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcba256a80 a2=0 a3=7ffcba256a6c items=0 ppid=2597 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.484750 kernel: audit: type=1327 audit(1757724984.436:906): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.484864 kernel: audit: type=1325 audit(1757724984.472:907): table=nat:101 family=2 entries=12 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.472000 audit[2872]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.472000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcba256a80 a2=0 a3=0 items=0 ppid=2597 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.530382 kernel: audit: type=1300 audit(1757724984.472:907): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcba256a80 a2=0 a3=0 items=0 ppid=2597 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.530493 kernel: audit: type=1327 audit(1757724984.472:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.544000 audit[2874]: NETFILTER_CFG table=filter:102 family=2 entries=18 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.544000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff3e9ae380 a2=0 a3=7fff3e9ae36c items=0 ppid=2597 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.578720 kernel: audit: type=1325 audit(1757724984.544:908): table=filter:102 family=2 entries=18 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.578860 kernel: audit: type=1300 audit(1757724984.544:908): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff3e9ae380 a2=0 a3=7fff3e9ae36c items=0 ppid=2597 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.591044 kernel: audit: type=1327 audit(1757724984.544:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.598000 audit[2874]: NETFILTER_CFG table=nat:103 family=2 entries=12 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:24.598000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff3e9ae380 a2=0 a3=0 items=0 ppid=2597 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:24.611536 kernel: audit: type=1325 audit(1757724984.598:909): table=nat:103 family=2 entries=12 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:25.009422 systemd[1]: Created slice kubepods-besteffort-pod2ba41676_b3d9_48fa_a101_075065272b95.slice. Sep 13 00:56:25.119135 kubelet[2493]: I0913 00:56:25.119093 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ba41676-b3d9-48fa-a101-075065272b95-tigera-ca-bundle\") pod \"calico-typha-6d87d986d9-qj75t\" (UID: \"2ba41676-b3d9-48fa-a101-075065272b95\") " pod="calico-system/calico-typha-6d87d986d9-qj75t" Sep 13 00:56:25.119500 kubelet[2493]: I0913 00:56:25.119143 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2ba41676-b3d9-48fa-a101-075065272b95-typha-certs\") pod \"calico-typha-6d87d986d9-qj75t\" (UID: \"2ba41676-b3d9-48fa-a101-075065272b95\") " pod="calico-system/calico-typha-6d87d986d9-qj75t" Sep 13 00:56:25.119500 kubelet[2493]: I0913 00:56:25.119173 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dngb7\" (UniqueName: \"kubernetes.io/projected/2ba41676-b3d9-48fa-a101-075065272b95-kube-api-access-dngb7\") pod \"calico-typha-6d87d986d9-qj75t\" (UID: \"2ba41676-b3d9-48fa-a101-075065272b95\") " pod="calico-system/calico-typha-6d87d986d9-qj75t" Sep 13 00:56:25.321048 env[1457]: time="2025-09-13T00:56:25.320936634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6d87d986d9-qj75t,Uid:2ba41676-b3d9-48fa-a101-075065272b95,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:25.359265 env[1457]: time="2025-09-13T00:56:25.359196250Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:25.359420 env[1457]: time="2025-09-13T00:56:25.359273849Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:25.359420 env[1457]: time="2025-09-13T00:56:25.359302449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:25.359522 env[1457]: time="2025-09-13T00:56:25.359441547Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2f4b59cc18b767da539408e535a05cfd19cea6be36dfcf952e5893ca4133030 pid=2883 runtime=io.containerd.runc.v2 Sep 13 00:56:25.378559 systemd[1]: Started cri-containerd-c2f4b59cc18b767da539408e535a05cfd19cea6be36dfcf952e5893ca4133030.scope. Sep 13 00:56:25.410119 systemd[1]: Created slice kubepods-besteffort-pod6afd4c30_bb62_4f6f_92e0_84813cc53531.slice. Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.440000 audit: BPF prog-id=116 op=LOAD Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663462353963633138623736376461353339343038653533356130 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663462353963633138623736376461353339343038653533356130 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit: BPF prog-id=117 op=LOAD Sep 13 00:56:25.441000 audit[2893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003085f0 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663462353963633138623736376461353339343038653533356130 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit: BPF prog-id=118 op=LOAD Sep 13 00:56:25.441000 audit[2893]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000308638 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663462353963633138623736376461353339343038653533356130 Sep 13 00:56:25.441000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:56:25.441000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.441000 audit: BPF prog-id=119 op=LOAD Sep 13 00:56:25.441000 audit[2893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000308a48 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663462353963633138623736376461353339343038653533356130 Sep 13 00:56:25.472288 env[1457]: time="2025-09-13T00:56:25.472244526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6d87d986d9-qj75t,Uid:2ba41676-b3d9-48fa-a101-075065272b95,Namespace:calico-system,Attempt:0,} returns sandbox id \"c2f4b59cc18b767da539408e535a05cfd19cea6be36dfcf952e5893ca4133030\"" Sep 13 00:56:25.474780 env[1457]: time="2025-09-13T00:56:25.474752188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 13 00:56:25.521567 kubelet[2493]: I0913 00:56:25.521529 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-lib-modules\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521714 kubelet[2493]: I0913 00:56:25.521574 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-var-run-calico\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521714 kubelet[2493]: I0913 00:56:25.521603 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9p22x\" (UniqueName: \"kubernetes.io/projected/6afd4c30-bb62-4f6f-92e0-84813cc53531-kube-api-access-9p22x\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521714 kubelet[2493]: I0913 00:56:25.521626 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-cni-net-dir\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521714 kubelet[2493]: I0913 00:56:25.521664 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6afd4c30-bb62-4f6f-92e0-84813cc53531-tigera-ca-bundle\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521714 kubelet[2493]: I0913 00:56:25.521688 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-cni-log-dir\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521931 kubelet[2493]: I0913 00:56:25.521709 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-policysync\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521931 kubelet[2493]: I0913 00:56:25.521737 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-flexvol-driver-host\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521931 kubelet[2493]: I0913 00:56:25.521768 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6afd4c30-bb62-4f6f-92e0-84813cc53531-node-certs\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521931 kubelet[2493]: I0913 00:56:25.521794 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-var-lib-calico\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.521931 kubelet[2493]: I0913 00:56:25.521821 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-xtables-lock\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.522073 kubelet[2493]: I0913 00:56:25.521847 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6afd4c30-bb62-4f6f-92e0-84813cc53531-cni-bin-dir\") pod \"calico-node-hrdfd\" (UID: \"6afd4c30-bb62-4f6f-92e0-84813cc53531\") " pod="calico-system/calico-node-hrdfd" Sep 13 00:56:25.620848 kubelet[2493]: E0913 00:56:25.620708 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:25.624064 kubelet[2493]: E0913 00:56:25.624038 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.624064 kubelet[2493]: W0913 00:56:25.624062 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.624240 kubelet[2493]: E0913 00:56:25.624098 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.625247 kubelet[2493]: E0913 00:56:25.624439 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.625247 kubelet[2493]: W0913 00:56:25.624464 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.625247 kubelet[2493]: E0913 00:56:25.624479 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.625247 kubelet[2493]: E0913 00:56:25.624695 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.625247 kubelet[2493]: W0913 00:56:25.624705 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.625247 kubelet[2493]: E0913 00:56:25.624718 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.625247 kubelet[2493]: E0913 00:56:25.625046 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.625247 kubelet[2493]: W0913 00:56:25.625057 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.625247 kubelet[2493]: E0913 00:56:25.625079 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.625937 kubelet[2493]: E0913 00:56:25.625715 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.625937 kubelet[2493]: W0913 00:56:25.625741 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.625937 kubelet[2493]: E0913 00:56:25.625764 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.626140 kubelet[2493]: E0913 00:56:25.626130 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.626211 kubelet[2493]: W0913 00:56:25.626202 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.626282 kubelet[2493]: E0913 00:56:25.626271 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.629197 kubelet[2493]: E0913 00:56:25.629176 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.629197 kubelet[2493]: W0913 00:56:25.629197 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.629341 kubelet[2493]: E0913 00:56:25.629215 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.629582 kubelet[2493]: E0913 00:56:25.629549 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.629582 kubelet[2493]: W0913 00:56:25.629563 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.629723 kubelet[2493]: E0913 00:56:25.629710 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.629953 kubelet[2493]: E0913 00:56:25.629940 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.630013 kubelet[2493]: W0913 00:56:25.629954 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.630115 kubelet[2493]: E0913 00:56:25.630102 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.631494 kubelet[2493]: E0913 00:56:25.631468 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.631494 kubelet[2493]: W0913 00:56:25.631486 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.631676 kubelet[2493]: E0913 00:56:25.631660 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.631764 kubelet[2493]: E0913 00:56:25.631681 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.631841 kubelet[2493]: W0913 00:56:25.631829 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.632643 kubelet[2493]: E0913 00:56:25.632619 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.632807 kubelet[2493]: E0913 00:56:25.632796 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.632892 kubelet[2493]: W0913 00:56:25.632880 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.633065 kubelet[2493]: E0913 00:56:25.633051 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.633344 kubelet[2493]: E0913 00:56:25.633332 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.633446 kubelet[2493]: W0913 00:56:25.633433 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.633686 kubelet[2493]: E0913 00:56:25.633672 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.633928 kubelet[2493]: E0913 00:56:25.633917 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.634019 kubelet[2493]: W0913 00:56:25.634008 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.634119 kubelet[2493]: E0913 00:56:25.634101 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.634398 kubelet[2493]: E0913 00:56:25.634385 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.634496 kubelet[2493]: W0913 00:56:25.634483 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.634661 kubelet[2493]: E0913 00:56:25.634610 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.634894 kubelet[2493]: E0913 00:56:25.634883 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.634974 kubelet[2493]: W0913 00:56:25.634962 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.635049 kubelet[2493]: E0913 00:56:25.635038 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.635613 kubelet[2493]: E0913 00:56:25.635596 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.635613 kubelet[2493]: W0913 00:56:25.635612 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.635724 kubelet[2493]: E0913 00:56:25.635629 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.637199 kubelet[2493]: E0913 00:56:25.637167 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.637199 kubelet[2493]: W0913 00:56:25.637184 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.637332 kubelet[2493]: E0913 00:56:25.637204 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.637727 kubelet[2493]: E0913 00:56:25.637702 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.637727 kubelet[2493]: W0913 00:56:25.637720 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.637882 kubelet[2493]: E0913 00:56:25.637861 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.637971 kubelet[2493]: E0913 00:56:25.637955 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.638022 kubelet[2493]: W0913 00:56:25.637972 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.638022 kubelet[2493]: E0913 00:56:25.637986 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.638611 kubelet[2493]: E0913 00:56:25.638586 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.638611 kubelet[2493]: W0913 00:56:25.638601 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.638736 kubelet[2493]: E0913 00:56:25.638615 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.638825 kubelet[2493]: E0913 00:56:25.638813 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.638886 kubelet[2493]: W0913 00:56:25.638826 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.638886 kubelet[2493]: E0913 00:56:25.638837 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.640572 kubelet[2493]: E0913 00:56:25.640554 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.640682 kubelet[2493]: W0913 00:56:25.640668 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.640767 kubelet[2493]: E0913 00:56:25.640750 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.642593 kubelet[2493]: E0913 00:56:25.642578 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.642705 kubelet[2493]: W0913 00:56:25.642692 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.642786 kubelet[2493]: E0913 00:56:25.642774 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.643032 kubelet[2493]: E0913 00:56:25.643022 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.643106 kubelet[2493]: W0913 00:56:25.643095 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.643170 kubelet[2493]: E0913 00:56:25.643160 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.643406 kubelet[2493]: E0913 00:56:25.643396 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.643479 kubelet[2493]: W0913 00:56:25.643470 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.643602 kubelet[2493]: E0913 00:56:25.643590 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.643840 kubelet[2493]: E0913 00:56:25.643825 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.643909 kubelet[2493]: W0913 00:56:25.643898 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.643974 kubelet[2493]: E0913 00:56:25.643963 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.644208 kubelet[2493]: E0913 00:56:25.644198 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.644275 kubelet[2493]: W0913 00:56:25.644265 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.644349 kubelet[2493]: E0913 00:56:25.644338 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.646620 kubelet[2493]: E0913 00:56:25.646604 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.646732 kubelet[2493]: W0913 00:56:25.646718 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.646831 kubelet[2493]: E0913 00:56:25.646811 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.647087 kubelet[2493]: E0913 00:56:25.647073 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.647179 kubelet[2493]: W0913 00:56:25.647167 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.647270 kubelet[2493]: E0913 00:56:25.647258 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.647542 kubelet[2493]: E0913 00:56:25.647523 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.647542 kubelet[2493]: W0913 00:56:25.647540 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.647668 kubelet[2493]: E0913 00:56:25.647554 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.647742 kubelet[2493]: E0913 00:56:25.647728 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.647787 kubelet[2493]: W0913 00:56:25.647744 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.647787 kubelet[2493]: E0913 00:56:25.647755 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.647926 kubelet[2493]: E0913 00:56:25.647914 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.647974 kubelet[2493]: W0913 00:56:25.647928 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.647974 kubelet[2493]: E0913 00:56:25.647940 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.648119 kubelet[2493]: E0913 00:56:25.648107 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.648164 kubelet[2493]: W0913 00:56:25.648120 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.648164 kubelet[2493]: E0913 00:56:25.648131 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.647000 audit[2941]: NETFILTER_CFG table=filter:104 family=2 entries=20 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:25.647000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffcc14da020 a2=0 a3=7ffcc14da00c items=0 ppid=2597 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:25.652000 audit[2941]: NETFILTER_CFG table=nat:105 family=2 entries=12 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:25.652000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc14da020 a2=0 a3=0 items=0 ppid=2597 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:25.713586 env[1457]: time="2025-09-13T00:56:25.713540045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hrdfd,Uid:6afd4c30-bb62-4f6f-92e0-84813cc53531,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:25.723075 kubelet[2493]: E0913 00:56:25.723050 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.723260 kubelet[2493]: W0913 00:56:25.723242 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.723370 kubelet[2493]: E0913 00:56:25.723355 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.723496 kubelet[2493]: I0913 00:56:25.723481 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8743e6b0-f51c-4f1f-842b-0b583fb9e879-kubelet-dir\") pod \"csi-node-driver-4vpwd\" (UID: \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\") " pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:25.723958 kubelet[2493]: E0913 00:56:25.723944 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.724155 kubelet[2493]: W0913 00:56:25.724138 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.724274 kubelet[2493]: E0913 00:56:25.724261 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.724608 kubelet[2493]: E0913 00:56:25.724593 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.724708 kubelet[2493]: W0913 00:56:25.724695 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.724806 kubelet[2493]: E0913 00:56:25.724794 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.724984 kubelet[2493]: I0913 00:56:25.724969 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8743e6b0-f51c-4f1f-842b-0b583fb9e879-socket-dir\") pod \"csi-node-driver-4vpwd\" (UID: \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\") " pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:25.725233 kubelet[2493]: E0913 00:56:25.725216 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.725321 kubelet[2493]: W0913 00:56:25.725309 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.725398 kubelet[2493]: E0913 00:56:25.725387 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.726182 kubelet[2493]: E0913 00:56:25.726168 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.726288 kubelet[2493]: W0913 00:56:25.726277 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.726365 kubelet[2493]: E0913 00:56:25.726354 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.726664 kubelet[2493]: E0913 00:56:25.726651 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.726752 kubelet[2493]: W0913 00:56:25.726741 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.726826 kubelet[2493]: E0913 00:56:25.726815 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.726998 kubelet[2493]: I0913 00:56:25.726981 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8743e6b0-f51c-4f1f-842b-0b583fb9e879-varrun\") pod \"csi-node-driver-4vpwd\" (UID: \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\") " pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:25.727212 kubelet[2493]: E0913 00:56:25.727202 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.727303 kubelet[2493]: W0913 00:56:25.727292 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.727386 kubelet[2493]: E0913 00:56:25.727376 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.727829 kubelet[2493]: E0913 00:56:25.727795 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.727940 kubelet[2493]: W0913 00:56:25.727927 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.728037 kubelet[2493]: E0913 00:56:25.728026 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.730129 kubelet[2493]: E0913 00:56:25.730093 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.730246 kubelet[2493]: W0913 00:56:25.730232 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.730334 kubelet[2493]: E0913 00:56:25.730322 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.730500 kubelet[2493]: I0913 00:56:25.730487 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8743e6b0-f51c-4f1f-842b-0b583fb9e879-registration-dir\") pod \"csi-node-driver-4vpwd\" (UID: \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\") " pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:25.730911 kubelet[2493]: E0913 00:56:25.730899 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.731017 kubelet[2493]: W0913 00:56:25.731006 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.731090 kubelet[2493]: E0913 00:56:25.731079 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.731399 kubelet[2493]: E0913 00:56:25.731388 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.733959 kubelet[2493]: W0913 00:56:25.733942 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.734087 kubelet[2493]: E0913 00:56:25.734074 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.734407 kubelet[2493]: E0913 00:56:25.734385 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.734537 kubelet[2493]: W0913 00:56:25.734522 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.734624 kubelet[2493]: E0913 00:56:25.734613 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.734811 kubelet[2493]: I0913 00:56:25.734796 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t5zbp\" (UniqueName: \"kubernetes.io/projected/8743e6b0-f51c-4f1f-842b-0b583fb9e879-kube-api-access-t5zbp\") pod \"csi-node-driver-4vpwd\" (UID: \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\") " pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:25.735071 kubelet[2493]: E0913 00:56:25.735060 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.735165 kubelet[2493]: W0913 00:56:25.735154 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.735233 kubelet[2493]: E0913 00:56:25.735221 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.737587 kubelet[2493]: E0913 00:56:25.737571 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.737699 kubelet[2493]: W0913 00:56:25.737685 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.737797 kubelet[2493]: E0913 00:56:25.737784 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.738106 kubelet[2493]: E0913 00:56:25.738092 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.738199 kubelet[2493]: W0913 00:56:25.738186 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.738288 kubelet[2493]: E0913 00:56:25.738276 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.752464 env[1457]: time="2025-09-13T00:56:25.752401052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:25.752679 env[1457]: time="2025-09-13T00:56:25.752651148Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:25.752778 env[1457]: time="2025-09-13T00:56:25.752758147Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:25.754179 env[1457]: time="2025-09-13T00:56:25.753030143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164 pid=2975 runtime=io.containerd.runc.v2 Sep 13 00:56:25.790768 systemd[1]: Started cri-containerd-05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164.scope. Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.814000 audit: BPF prog-id=120 op=LOAD Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2975 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035633931663338313465363765613664366338613066653231656636 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2975 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035633931663338313465363765613664366338613066653231656636 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit: BPF prog-id=121 op=LOAD Sep 13 00:56:25.815000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000288520 items=0 ppid=2975 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035633931663338313465363765613664366338613066653231656636 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit: BPF prog-id=122 op=LOAD Sep 13 00:56:25.815000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000288568 items=0 ppid=2975 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035633931663338313465363765613664366338613066653231656636 Sep 13 00:56:25.815000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:56:25.815000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:25.815000 audit: BPF prog-id=123 op=LOAD Sep 13 00:56:25.815000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000288978 items=0 ppid=2975 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035633931663338313465363765613664366338613066653231656636 Sep 13 00:56:25.828500 env[1457]: time="2025-09-13T00:56:25.828458092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hrdfd,Uid:6afd4c30-bb62-4f6f-92e0-84813cc53531,Namespace:calico-system,Attempt:0,} returns sandbox id \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\"" Sep 13 00:56:25.836433 kubelet[2493]: E0913 00:56:25.836389 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.836433 kubelet[2493]: W0913 00:56:25.836430 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.836631 kubelet[2493]: E0913 00:56:25.836453 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.836827 kubelet[2493]: E0913 00:56:25.836809 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.836899 kubelet[2493]: W0913 00:56:25.836826 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.836899 kubelet[2493]: E0913 00:56:25.836856 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.837163 kubelet[2493]: E0913 00:56:25.837137 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.837163 kubelet[2493]: W0913 00:56:25.837152 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.837299 kubelet[2493]: E0913 00:56:25.837166 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.837500 kubelet[2493]: E0913 00:56:25.837469 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.837500 kubelet[2493]: W0913 00:56:25.837481 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.837630 kubelet[2493]: E0913 00:56:25.837547 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.837838 kubelet[2493]: E0913 00:56:25.837817 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.837901 kubelet[2493]: W0913 00:56:25.837844 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.837901 kubelet[2493]: E0913 00:56:25.837858 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.838448 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840198 kubelet[2493]: W0913 00:56:25.838465 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.838532 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.838707 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840198 kubelet[2493]: W0913 00:56:25.838717 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.838797 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.838934 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840198 kubelet[2493]: W0913 00:56:25.838944 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.839020 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840198 kubelet[2493]: E0913 00:56:25.839146 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840663 kubelet[2493]: W0913 00:56:25.839154 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.840663 kubelet[2493]: E0913 00:56:25.839226 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840663 kubelet[2493]: E0913 00:56:25.839342 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840663 kubelet[2493]: W0913 00:56:25.839350 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.840663 kubelet[2493]: E0913 00:56:25.839424 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840663 kubelet[2493]: E0913 00:56:25.839554 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840663 kubelet[2493]: W0913 00:56:25.839562 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.840663 kubelet[2493]: E0913 00:56:25.839577 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.840663 kubelet[2493]: E0913 00:56:25.839763 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.840663 kubelet[2493]: W0913 00:56:25.839772 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.841005 kubelet[2493]: E0913 00:56:25.839786 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.841005 kubelet[2493]: E0913 00:56:25.840011 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.841005 kubelet[2493]: W0913 00:56:25.840022 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.841005 kubelet[2493]: E0913 00:56:25.840100 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841204 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.842044 kubelet[2493]: W0913 00:56:25.841219 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841309 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841438 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.842044 kubelet[2493]: W0913 00:56:25.841447 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841547 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841668 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.842044 kubelet[2493]: W0913 00:56:25.841677 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841756 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.842044 kubelet[2493]: E0913 00:56:25.841868 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.842431 kubelet[2493]: W0913 00:56:25.841877 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.842431 kubelet[2493]: E0913 00:56:25.841963 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.842863 kubelet[2493]: E0913 00:56:25.842687 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.842863 kubelet[2493]: W0913 00:56:25.842703 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.842863 kubelet[2493]: E0913 00:56:25.842729 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.843289 kubelet[2493]: E0913 00:56:25.843095 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.843289 kubelet[2493]: W0913 00:56:25.843108 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.843289 kubelet[2493]: E0913 00:56:25.843191 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.843617 kubelet[2493]: E0913 00:56:25.843476 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.843617 kubelet[2493]: W0913 00:56:25.843488 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.843839 kubelet[2493]: E0913 00:56:25.843743 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.844029 kubelet[2493]: E0913 00:56:25.844017 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.844102 kubelet[2493]: W0913 00:56:25.844091 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.844238 kubelet[2493]: E0913 00:56:25.844225 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.844451 kubelet[2493]: E0913 00:56:25.844440 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.844542 kubelet[2493]: W0913 00:56:25.844531 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.845039 kubelet[2493]: E0913 00:56:25.845021 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.845375 kubelet[2493]: E0913 00:56:25.845364 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.845459 kubelet[2493]: W0913 00:56:25.845448 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.845560 kubelet[2493]: E0913 00:56:25.845548 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.846060 kubelet[2493]: E0913 00:56:25.846048 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.846158 kubelet[2493]: W0913 00:56:25.846147 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.846231 kubelet[2493]: E0913 00:56:25.846220 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.846537 kubelet[2493]: E0913 00:56:25.846510 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.846631 kubelet[2493]: W0913 00:56:25.846620 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.846700 kubelet[2493]: E0913 00:56:25.846689 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:25.858226 kubelet[2493]: E0913 00:56:25.858201 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:25.858226 kubelet[2493]: W0913 00:56:25.858224 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:25.858377 kubelet[2493]: E0913 00:56:25.858242 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:26.232794 systemd[1]: run-containerd-runc-k8s.io-c2f4b59cc18b767da539408e535a05cfd19cea6be36dfcf952e5893ca4133030-runc.C2ogFu.mount: Deactivated successfully. Sep 13 00:56:26.711785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4228359306.mount: Deactivated successfully. Sep 13 00:56:27.314588 kubelet[2493]: E0913 00:56:27.313427 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:28.357862 env[1457]: time="2025-09-13T00:56:28.357820124Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.364639 env[1457]: time="2025-09-13T00:56:28.364602925Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.368910 env[1457]: time="2025-09-13T00:56:28.368881862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.372600 env[1457]: time="2025-09-13T00:56:28.372568808Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.372984 env[1457]: time="2025-09-13T00:56:28.372953303Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 13 00:56:28.374443 env[1457]: time="2025-09-13T00:56:28.374082486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:56:28.392809 env[1457]: time="2025-09-13T00:56:28.392768114Z" level=info msg="CreateContainer within sandbox \"c2f4b59cc18b767da539408e535a05cfd19cea6be36dfcf952e5893ca4133030\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 13 00:56:28.440703 env[1457]: time="2025-09-13T00:56:28.440650415Z" level=info msg="CreateContainer within sandbox \"c2f4b59cc18b767da539408e535a05cfd19cea6be36dfcf952e5893ca4133030\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"33ad900d3f8d9d8a67f8736f00f60df1cdfaf0c88f4248ef94fb506ce1bdc0d6\"" Sep 13 00:56:28.441451 env[1457]: time="2025-09-13T00:56:28.441416204Z" level=info msg="StartContainer for \"33ad900d3f8d9d8a67f8736f00f60df1cdfaf0c88f4248ef94fb506ce1bdc0d6\"" Sep 13 00:56:28.490018 systemd[1]: Started cri-containerd-33ad900d3f8d9d8a67f8736f00f60df1cdfaf0c88f4248ef94fb506ce1bdc0d6.scope. Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.573000 audit: BPF prog-id=124 op=LOAD Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2883 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333616439303064336638643964386136376638373336663030663630 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2883 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333616439303064336638643964386136376638373336663030663630 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit: BPF prog-id=125 op=LOAD Sep 13 00:56:28.574000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002fd0d0 items=0 ppid=2883 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333616439303064336638643964386136376638373336663030663630 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit: BPF prog-id=126 op=LOAD Sep 13 00:56:28.574000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002fd118 items=0 ppid=2883 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333616439303064336638643964386136376638373336663030663630 Sep 13 00:56:28.574000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:56:28.574000 audit: BPF prog-id=125 op=UNLOAD Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.574000 audit: BPF prog-id=127 op=LOAD Sep 13 00:56:28.574000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002fd528 items=0 ppid=2883 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333616439303064336638643964386136376638373336663030663630 Sep 13 00:56:28.612349 env[1457]: time="2025-09-13T00:56:28.612235412Z" level=info msg="StartContainer for \"33ad900d3f8d9d8a67f8736f00f60df1cdfaf0c88f4248ef94fb506ce1bdc0d6\" returns successfully" Sep 13 00:56:29.315199 kubelet[2493]: E0913 00:56:29.315152 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:29.426807 kubelet[2493]: I0913 00:56:29.426282 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6d87d986d9-qj75t" podStartSLOduration=2.5260728390000002 podStartE2EDuration="5.426262024s" podCreationTimestamp="2025-09-13 00:56:24 +0000 UTC" firstStartedPulling="2025-09-13 00:56:25.473691904 +0000 UTC m=+22.881960168" lastFinishedPulling="2025-09-13 00:56:28.373881189 +0000 UTC m=+25.782149353" observedRunningTime="2025-09-13 00:56:29.425713332 +0000 UTC m=+26.833981496" watchObservedRunningTime="2025-09-13 00:56:29.426262024 +0000 UTC m=+26.834530188" Sep 13 00:56:29.474146 kubelet[2493]: E0913 00:56:29.474104 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.474146 kubelet[2493]: W0913 00:56:29.474141 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.474383 kubelet[2493]: E0913 00:56:29.474164 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.474383 kubelet[2493]: E0913 00:56:29.474363 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.474383 kubelet[2493]: W0913 00:56:29.474373 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.474543 kubelet[2493]: E0913 00:56:29.474384 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.474592 kubelet[2493]: E0913 00:56:29.474582 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.474632 kubelet[2493]: W0913 00:56:29.474592 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.474632 kubelet[2493]: E0913 00:56:29.474611 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.474874 kubelet[2493]: E0913 00:56:29.474860 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.474924 kubelet[2493]: W0913 00:56:29.474885 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.474924 kubelet[2493]: E0913 00:56:29.474898 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.475102 kubelet[2493]: E0913 00:56:29.475091 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.475149 kubelet[2493]: W0913 00:56:29.475104 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.475149 kubelet[2493]: E0913 00:56:29.475122 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.475297 kubelet[2493]: E0913 00:56:29.475286 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.475344 kubelet[2493]: W0913 00:56:29.475299 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.475344 kubelet[2493]: E0913 00:56:29.475309 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.475491 kubelet[2493]: E0913 00:56:29.475481 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.475590 kubelet[2493]: W0913 00:56:29.475492 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.475590 kubelet[2493]: E0913 00:56:29.475502 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.475682 kubelet[2493]: E0913 00:56:29.475676 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.475724 kubelet[2493]: W0913 00:56:29.475687 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.475724 kubelet[2493]: E0913 00:56:29.475697 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.475971 kubelet[2493]: E0913 00:56:29.475957 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.476033 kubelet[2493]: W0913 00:56:29.475972 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.476033 kubelet[2493]: E0913 00:56:29.475984 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.476152 kubelet[2493]: E0913 00:56:29.476141 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.476196 kubelet[2493]: W0913 00:56:29.476154 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.476196 kubelet[2493]: E0913 00:56:29.476164 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.476331 kubelet[2493]: E0913 00:56:29.476321 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.476378 kubelet[2493]: W0913 00:56:29.476333 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.476378 kubelet[2493]: E0913 00:56:29.476342 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.476530 kubelet[2493]: E0913 00:56:29.476519 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.476577 kubelet[2493]: W0913 00:56:29.476541 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.476577 kubelet[2493]: E0913 00:56:29.476551 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.476746 kubelet[2493]: E0913 00:56:29.476735 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.476795 kubelet[2493]: W0913 00:56:29.476748 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.476795 kubelet[2493]: E0913 00:56:29.476759 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.476924 kubelet[2493]: E0913 00:56:29.476914 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.476971 kubelet[2493]: W0913 00:56:29.476926 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.476971 kubelet[2493]: E0913 00:56:29.476935 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.477119 kubelet[2493]: E0913 00:56:29.477109 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.477165 kubelet[2493]: W0913 00:56:29.477124 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.477165 kubelet[2493]: E0913 00:56:29.477133 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.567978 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570157 kubelet[2493]: W0913 00:56:29.568017 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.568038 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.568338 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570157 kubelet[2493]: W0913 00:56:29.568355 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.568370 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.568642 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570157 kubelet[2493]: W0913 00:56:29.568652 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.568667 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570157 kubelet[2493]: E0913 00:56:29.568903 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570696 kubelet[2493]: W0913 00:56:29.568913 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.570696 kubelet[2493]: E0913 00:56:29.568935 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570696 kubelet[2493]: E0913 00:56:29.569127 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570696 kubelet[2493]: W0913 00:56:29.569135 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.570696 kubelet[2493]: E0913 00:56:29.569149 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570696 kubelet[2493]: E0913 00:56:29.569339 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570696 kubelet[2493]: W0913 00:56:29.569347 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.570696 kubelet[2493]: E0913 00:56:29.569427 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.570696 kubelet[2493]: E0913 00:56:29.569563 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.570696 kubelet[2493]: W0913 00:56:29.569572 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.569656 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.569785 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571102 kubelet[2493]: W0913 00:56:29.569793 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.569893 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.570025 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571102 kubelet[2493]: W0913 00:56:29.570033 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.570046 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.570497 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571102 kubelet[2493]: W0913 00:56:29.570522 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571102 kubelet[2493]: E0913 00:56:29.570551 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.570764 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571498 kubelet[2493]: W0913 00:56:29.570774 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.570788 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.570994 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571498 kubelet[2493]: W0913 00:56:29.571002 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.571078 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.571208 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571498 kubelet[2493]: W0913 00:56:29.571217 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.571237 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571498 kubelet[2493]: E0913 00:56:29.571419 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571917 kubelet[2493]: W0913 00:56:29.571427 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571917 kubelet[2493]: E0913 00:56:29.571439 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.571917 kubelet[2493]: E0913 00:56:29.571685 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.571917 kubelet[2493]: W0913 00:56:29.571695 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.571917 kubelet[2493]: E0913 00:56:29.571715 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.572273 kubelet[2493]: E0913 00:56:29.572258 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.572328 kubelet[2493]: W0913 00:56:29.572276 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.572393 kubelet[2493]: E0913 00:56:29.572379 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.572680 kubelet[2493]: E0913 00:56:29.572666 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.572757 kubelet[2493]: W0913 00:56:29.572680 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.572757 kubelet[2493]: E0913 00:56:29.572700 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.573041 kubelet[2493]: E0913 00:56:29.573027 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:56:29.573088 kubelet[2493]: W0913 00:56:29.573042 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:56:29.573088 kubelet[2493]: E0913 00:56:29.573053 2493 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:56:29.619309 env[1457]: time="2025-09-13T00:56:29.619267549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:29.625976 env[1457]: time="2025-09-13T00:56:29.625937653Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:29.631014 env[1457]: time="2025-09-13T00:56:29.630980980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:29.635284 env[1457]: time="2025-09-13T00:56:29.635254419Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:29.635680 env[1457]: time="2025-09-13T00:56:29.635649313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:56:29.638631 env[1457]: time="2025-09-13T00:56:29.638601371Z" level=info msg="CreateContainer within sandbox \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:56:29.681501 env[1457]: time="2025-09-13T00:56:29.681297657Z" level=info msg="CreateContainer within sandbox \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da\"" Sep 13 00:56:29.683166 env[1457]: time="2025-09-13T00:56:29.683120430Z" level=info msg="StartContainer for \"2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da\"" Sep 13 00:56:29.708166 systemd[1]: Started cri-containerd-2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da.scope. Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.730876 kernel: kauditd_printk_skb: 179 callbacks suppressed Sep 13 00:56:29.731003 kernel: audit: type=1400 audit(1757724989.725:966): avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f158106e0e8 items=0 ppid=2975 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:29.766272 kernel: audit: type=1300 audit(1757724989.725:966): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f158106e0e8 items=0 ppid=2975 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:29.784574 kernel: audit: type=1327 audit(1757724989.725:966): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373035363539363561666438636439663163313530363532313732 Sep 13 00:56:29.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373035363539363561666438636439663163313530363532313732 Sep 13 00:56:29.786407 systemd[1]: cri-containerd-2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da.scope: Deactivated successfully. Sep 13 00:56:29.800339 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.801129 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.812835 env[1457]: time="2025-09-13T00:56:29.812798365Z" level=info msg="StartContainer for \"2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da\" returns successfully" Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.826776 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.837712 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da-rootfs.mount: Deactivated successfully. Sep 13 00:56:29.845951 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.846037 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.871671 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.947730 kernel: audit: type=1400 audit(1757724989.725:967): avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit: BPF prog-id=128 op=LOAD Sep 13 00:56:29.725000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00021a3d8 items=0 ppid=2975 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:29.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373035363539363561666438636439663163313530363532313732 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit: BPF prog-id=129 op=LOAD Sep 13 00:56:29.725000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00021a428 items=0 ppid=2975 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:29.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373035363539363561666438636439663163313530363532313732 Sep 13 00:56:29.725000 audit: BPF prog-id=129 op=UNLOAD Sep 13 00:56:29.725000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:29.725000 audit: BPF prog-id=130 op=LOAD Sep 13 00:56:29.725000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00021a4b8 items=0 ppid=2975 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:29.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373035363539363561666438636439663163313530363532313732 Sep 13 00:56:29.812000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:56:30.410589 kubelet[2493]: I0913 00:56:30.410560 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:56:31.313823 kubelet[2493]: E0913 00:56:31.313782 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:31.354223 env[1457]: time="2025-09-13T00:56:31.354169940Z" level=info msg="shim disconnected" id=2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da Sep 13 00:56:31.354223 env[1457]: time="2025-09-13T00:56:31.354223139Z" level=warning msg="cleaning up after shim disconnected" id=2670565965afd8cd9f1c150652172d22c130c669977379d717cc518f8c6732da namespace=k8s.io Sep 13 00:56:31.354729 env[1457]: time="2025-09-13T00:56:31.354235039Z" level=info msg="cleaning up dead shim" Sep 13 00:56:31.361954 env[1457]: time="2025-09-13T00:56:31.361909632Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:56:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3160 runtime=io.containerd.runc.v2\n" Sep 13 00:56:31.415434 env[1457]: time="2025-09-13T00:56:31.414990490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:56:33.313806 kubelet[2493]: E0913 00:56:33.313409 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:35.065755 kubelet[2493]: I0913 00:56:35.065716 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:56:35.098000 audit[3174]: NETFILTER_CFG table=filter:106 family=2 entries=21 op=nft_register_rule pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:35.104203 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:56:35.104281 kernel: audit: type=1325 audit(1757724995.098:973): table=filter:106 family=2 entries=21 op=nft_register_rule pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:35.098000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff1af6d390 a2=0 a3=7fff1af6d37c items=0 ppid=2597 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.115307 env[1457]: time="2025-09-13T00:56:35.115250337Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:35.135030 kernel: audit: type=1300 audit(1757724995.098:973): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff1af6d390 a2=0 a3=7fff1af6d37c items=0 ppid=2597 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:35.146146 kernel: audit: type=1327 audit(1757724995.098:973): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:35.146250 kernel: audit: type=1325 audit(1757724995.134:974): table=nat:107 family=2 entries=19 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:35.134000 audit[3174]: NETFILTER_CFG table=nat:107 family=2 entries=19 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:35.159548 kernel: audit: type=1300 audit(1757724995.134:974): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff1af6d390 a2=0 a3=7fff1af6d37c items=0 ppid=2597 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.134000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff1af6d390 a2=0 a3=7fff1af6d37c items=0 ppid=2597 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.159722 env[1457]: time="2025-09-13T00:56:35.158410265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:35.163039 env[1457]: time="2025-09-13T00:56:35.163009304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:35.166967 env[1457]: time="2025-09-13T00:56:35.166945152Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:35.167319 env[1457]: time="2025-09-13T00:56:35.167298447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:56:35.170153 env[1457]: time="2025-09-13T00:56:35.170116210Z" level=info msg="CreateContainer within sandbox \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:56:35.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:35.188759 kernel: audit: type=1327 audit(1757724995.134:974): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:35.214069 env[1457]: time="2025-09-13T00:56:35.214022927Z" level=info msg="CreateContainer within sandbox \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879\"" Sep 13 00:56:35.215924 env[1457]: time="2025-09-13T00:56:35.214483421Z" level=info msg="StartContainer for \"5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879\"" Sep 13 00:56:35.247123 systemd[1]: Started cri-containerd-5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879.scope. Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fc25c3b09b8 items=0 ppid=2975 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.297408 kernel: audit: type=1400 audit(1757724995.262:975): avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.297592 kernel: audit: type=1300 audit(1757724995.262:975): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fc25c3b09b8 items=0 ppid=2975 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562356265623830646364663861313138663239383032643338383762 Sep 13 00:56:35.317789 kernel: audit: type=1327 audit(1757724995.262:975): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562356265623830646364663861313138663239383032643338383762 Sep 13 00:56:35.318429 kubelet[2493]: E0913 00:56:35.318396 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.262000 audit: BPF prog-id=131 op=LOAD Sep 13 00:56:35.262000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003c66d8 items=0 ppid=2975 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562356265623830646364663861313138663239383032643338383762 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit: BPF prog-id=132 op=LOAD Sep 13 00:56:35.277000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003c6728 items=0 ppid=2975 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562356265623830646364663861313138663239383032643338383762 Sep 13 00:56:35.277000 audit: BPF prog-id=132 op=UNLOAD Sep 13 00:56:35.277000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.337545 kernel: audit: type=1400 audit(1757724995.262:976): avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:35.277000 audit: BPF prog-id=133 op=LOAD Sep 13 00:56:35.277000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003c67b8 items=0 ppid=2975 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:35.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562356265623830646364663861313138663239383032643338383762 Sep 13 00:56:35.352243 env[1457]: time="2025-09-13T00:56:35.352183295Z" level=info msg="StartContainer for \"5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879\" returns successfully" Sep 13 00:56:37.009571 env[1457]: time="2025-09-13T00:56:37.009500084Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:56:37.011612 systemd[1]: cri-containerd-5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879.scope: Deactivated successfully. Sep 13 00:56:37.014000 audit: BPF prog-id=133 op=UNLOAD Sep 13 00:56:37.035544 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879-rootfs.mount: Deactivated successfully. Sep 13 00:56:37.092801 kubelet[2493]: I0913 00:56:37.091927 2493 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:56:37.690780 kubelet[2493]: I0913 00:56:37.230928 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wxv54\" (UniqueName: \"kubernetes.io/projected/502d5c2b-eda9-42cc-894a-209da2a4fe8a-kube-api-access-wxv54\") pod \"calico-kube-controllers-687cd554b6-dlwkd\" (UID: \"502d5c2b-eda9-42cc-894a-209da2a4fe8a\") " pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" Sep 13 00:56:37.690780 kubelet[2493]: I0913 00:56:37.230981 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xm8k7\" (UniqueName: \"kubernetes.io/projected/3ee92753-0503-4301-9dd8-260e451cee11-kube-api-access-xm8k7\") pod \"calico-apiserver-7fdb94b7b4-b7x7p\" (UID: \"3ee92753-0503-4301-9dd8-260e451cee11\") " pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" Sep 13 00:56:37.690780 kubelet[2493]: I0913 00:56:37.231009 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/7264b389-b98c-40ac-b232-ce7a430c65aa-config\") pod \"goldmane-54d579b49d-cdfz4\" (UID: \"7264b389-b98c-40ac-b232-ce7a430c65aa\") " pod="calico-system/goldmane-54d579b49d-cdfz4" Sep 13 00:56:37.690780 kubelet[2493]: I0913 00:56:37.231034 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-ca-bundle\") pod \"whisker-55b5cf7bc9-pphsm\" (UID: \"0b5d6a78-1934-4316-851c-6c8a15133340\") " pod="calico-system/whisker-55b5cf7bc9-pphsm" Sep 13 00:56:37.690780 kubelet[2493]: I0913 00:56:37.231070 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dc0f281d-1747-48f1-a1ba-e361ef4367c0-calico-apiserver-certs\") pod \"calico-apiserver-756d6c885f-vmgr4\" (UID: \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\") " pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" Sep 13 00:56:37.136308 systemd[1]: Created slice kubepods-besteffort-pod502d5c2b_eda9_42cc_894a_209da2a4fe8a.slice. Sep 13 00:56:37.691209 env[1457]: time="2025-09-13T00:56:37.690332878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vpwd,Uid:8743e6b0-f51c-4f1f-842b-0b583fb9e879,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:37.691274 kubelet[2493]: I0913 00:56:37.231096 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d-config-volume\") pod \"coredns-668d6bf9bc-p4jmt\" (UID: \"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d\") " pod="kube-system/coredns-668d6bf9bc-p4jmt" Sep 13 00:56:37.691274 kubelet[2493]: I0913 00:56:37.231131 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/7264b389-b98c-40ac-b232-ce7a430c65aa-goldmane-key-pair\") pod \"goldmane-54d579b49d-cdfz4\" (UID: \"7264b389-b98c-40ac-b232-ce7a430c65aa\") " pod="calico-system/goldmane-54d579b49d-cdfz4" Sep 13 00:56:37.691274 kubelet[2493]: I0913 00:56:37.231161 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2sxrn\" (UniqueName: \"kubernetes.io/projected/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-kube-api-access-2sxrn\") pod \"calico-apiserver-756d6c885f-gm4lp\" (UID: \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\") " pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" Sep 13 00:56:37.691274 kubelet[2493]: I0913 00:56:37.231184 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bdc39956-1ca6-45f4-86e0-ace05fcdfaf5-config-volume\") pod \"coredns-668d6bf9bc-ll9c8\" (UID: \"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5\") " pod="kube-system/coredns-668d6bf9bc-ll9c8" Sep 13 00:56:37.691274 kubelet[2493]: I0913 00:56:37.231223 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ng5m4\" (UniqueName: \"kubernetes.io/projected/bdc39956-1ca6-45f4-86e0-ace05fcdfaf5-kube-api-access-ng5m4\") pod \"coredns-668d6bf9bc-ll9c8\" (UID: \"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5\") " pod="kube-system/coredns-668d6bf9bc-ll9c8" Sep 13 00:56:37.151015 systemd[1]: Created slice kubepods-burstable-pod36bc83e1_d3b5_41bd_a8d0_506bc7e4a92d.slice. Sep 13 00:56:37.691538 kubelet[2493]: I0913 00:56:37.231248 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9ncqt\" (UniqueName: \"kubernetes.io/projected/36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d-kube-api-access-9ncqt\") pod \"coredns-668d6bf9bc-p4jmt\" (UID: \"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d\") " pod="kube-system/coredns-668d6bf9bc-p4jmt" Sep 13 00:56:37.691538 kubelet[2493]: I0913 00:56:37.231288 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q2c95\" (UniqueName: \"kubernetes.io/projected/dc0f281d-1747-48f1-a1ba-e361ef4367c0-kube-api-access-q2c95\") pod \"calico-apiserver-756d6c885f-vmgr4\" (UID: \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\") " pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" Sep 13 00:56:37.691538 kubelet[2493]: I0913 00:56:37.231313 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-backend-key-pair\") pod \"whisker-55b5cf7bc9-pphsm\" (UID: \"0b5d6a78-1934-4316-851c-6c8a15133340\") " pod="calico-system/whisker-55b5cf7bc9-pphsm" Sep 13 00:56:37.691538 kubelet[2493]: I0913 00:56:37.231339 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7gwzr\" (UniqueName: \"kubernetes.io/projected/7264b389-b98c-40ac-b232-ce7a430c65aa-kube-api-access-7gwzr\") pod \"goldmane-54d579b49d-cdfz4\" (UID: \"7264b389-b98c-40ac-b232-ce7a430c65aa\") " pod="calico-system/goldmane-54d579b49d-cdfz4" Sep 13 00:56:37.691538 kubelet[2493]: I0913 00:56:37.231375 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/502d5c2b-eda9-42cc-894a-209da2a4fe8a-tigera-ca-bundle\") pod \"calico-kube-controllers-687cd554b6-dlwkd\" (UID: \"502d5c2b-eda9-42cc-894a-209da2a4fe8a\") " pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" Sep 13 00:56:37.163269 systemd[1]: Created slice kubepods-besteffort-podf64e1518_9dc7_4135_aa11_2d5bffea4ae3.slice. Sep 13 00:56:37.691792 kubelet[2493]: I0913 00:56:37.231398 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3ee92753-0503-4301-9dd8-260e451cee11-calico-apiserver-certs\") pod \"calico-apiserver-7fdb94b7b4-b7x7p\" (UID: \"3ee92753-0503-4301-9dd8-260e451cee11\") " pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" Sep 13 00:56:37.691792 kubelet[2493]: I0913 00:56:37.231421 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vfpl5\" (UniqueName: \"kubernetes.io/projected/0b5d6a78-1934-4316-851c-6c8a15133340-kube-api-access-vfpl5\") pod \"whisker-55b5cf7bc9-pphsm\" (UID: \"0b5d6a78-1934-4316-851c-6c8a15133340\") " pod="calico-system/whisker-55b5cf7bc9-pphsm" Sep 13 00:56:37.691792 kubelet[2493]: I0913 00:56:37.231462 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7264b389-b98c-40ac-b232-ce7a430c65aa-goldmane-ca-bundle\") pod \"goldmane-54d579b49d-cdfz4\" (UID: \"7264b389-b98c-40ac-b232-ce7a430c65aa\") " pod="calico-system/goldmane-54d579b49d-cdfz4" Sep 13 00:56:37.691792 kubelet[2493]: I0913 00:56:37.231486 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-calico-apiserver-certs\") pod \"calico-apiserver-756d6c885f-gm4lp\" (UID: \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\") " pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" Sep 13 00:56:37.178039 systemd[1]: Created slice kubepods-besteffort-poddc0f281d_1747_48f1_a1ba_e361ef4367c0.slice. Sep 13 00:56:37.189627 systemd[1]: Created slice kubepods-besteffort-pod3ee92753_0503_4301_9dd8_260e451cee11.slice. Sep 13 00:56:37.194247 systemd[1]: Created slice kubepods-besteffort-pod0b5d6a78_1934_4316_851c_6c8a15133340.slice. Sep 13 00:56:37.198388 systemd[1]: Created slice kubepods-besteffort-pod7264b389_b98c_40ac_b232_ce7a430c65aa.slice. Sep 13 00:56:37.208721 systemd[1]: Created slice kubepods-burstable-podbdc39956_1ca6_45f4_86e0_ace05fcdfaf5.slice. Sep 13 00:56:37.319623 systemd[1]: Created slice kubepods-besteffort-pod8743e6b0_f51c_4f1f_842b_0b583fb9e879.slice. Sep 13 00:56:37.991757 env[1457]: time="2025-09-13T00:56:37.991598482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687cd554b6-dlwkd,Uid:502d5c2b-eda9-42cc-894a-209da2a4fe8a,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:37.997227 env[1457]: time="2025-09-13T00:56:37.997191509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-cdfz4,Uid:7264b389-b98c-40ac-b232-ce7a430c65aa,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:37.997624 env[1457]: time="2025-09-13T00:56:37.997598204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-55b5cf7bc9-pphsm,Uid:0b5d6a78-1934-4316-851c-6c8a15133340,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:38.010273 env[1457]: time="2025-09-13T00:56:38.010051344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fdb94b7b4-b7x7p,Uid:3ee92753-0503-4301-9dd8-260e451cee11,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:56:38.010273 env[1457]: time="2025-09-13T00:56:38.010087544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-gm4lp,Uid:f64e1518-9dc7-4135-aa11-2d5bffea4ae3,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:56:38.010683 env[1457]: time="2025-09-13T00:56:38.010571238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-vmgr4,Uid:dc0f281d-1747-48f1-a1ba-e361ef4367c0,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:56:38.021133 env[1457]: time="2025-09-13T00:56:38.021100003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-ll9c8,Uid:bdc39956-1ca6-45f4-86e0-ace05fcdfaf5,Namespace:kube-system,Attempt:0,}" Sep 13 00:56:38.043273 env[1457]: time="2025-09-13T00:56:38.043233520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-p4jmt,Uid:36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d,Namespace:kube-system,Attempt:0,}" Sep 13 00:56:38.342492 env[1457]: time="2025-09-13T00:56:38.342330998Z" level=info msg="shim disconnected" id=5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879 Sep 13 00:56:38.342492 env[1457]: time="2025-09-13T00:56:38.342408397Z" level=warning msg="cleaning up after shim disconnected" id=5b5beb80dcdf8a118f29802d3887bf31cd1c25ba19a8cf1f3b3708f53a5f5879 namespace=k8s.io Sep 13 00:56:38.342492 env[1457]: time="2025-09-13T00:56:38.342421997Z" level=info msg="cleaning up dead shim" Sep 13 00:56:38.350349 env[1457]: time="2025-09-13T00:56:38.350287797Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:56:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3263 runtime=io.containerd.runc.v2\n" Sep 13 00:56:38.435209 env[1457]: time="2025-09-13T00:56:38.435171712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:56:38.881150 env[1457]: time="2025-09-13T00:56:38.881066314Z" level=error msg="Failed to destroy network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.881576 env[1457]: time="2025-09-13T00:56:38.881526709Z" level=error msg="encountered an error cleaning up failed sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.881678 env[1457]: time="2025-09-13T00:56:38.881607407Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-ll9c8,Uid:bdc39956-1ca6-45f4-86e0-ace05fcdfaf5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.881885 kubelet[2493]: E0913 00:56:38.881838 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.882209 kubelet[2493]: E0913 00:56:38.881925 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-ll9c8" Sep 13 00:56:38.882209 kubelet[2493]: E0913 00:56:38.881957 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-ll9c8" Sep 13 00:56:38.882209 kubelet[2493]: E0913 00:56:38.882017 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-ll9c8_kube-system(bdc39956-1ca6-45f4-86e0-ace05fcdfaf5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-ll9c8_kube-system(bdc39956-1ca6-45f4-86e0-ace05fcdfaf5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-ll9c8" podUID="bdc39956-1ca6-45f4-86e0-ace05fcdfaf5" Sep 13 00:56:38.929345 env[1457]: time="2025-09-13T00:56:38.929275698Z" level=error msg="Failed to destroy network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.929913 env[1457]: time="2025-09-13T00:56:38.929870891Z" level=error msg="encountered an error cleaning up failed sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.930098 env[1457]: time="2025-09-13T00:56:38.930054188Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vpwd,Uid:8743e6b0-f51c-4f1f-842b-0b583fb9e879,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.932585 kubelet[2493]: E0913 00:56:38.930614 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.932585 kubelet[2493]: E0913 00:56:38.930688 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:38.932585 kubelet[2493]: E0913 00:56:38.930715 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4vpwd" Sep 13 00:56:38.932777 kubelet[2493]: E0913 00:56:38.930778 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-4vpwd_calico-system(8743e6b0-f51c-4f1f-842b-0b583fb9e879)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-4vpwd_calico-system(8743e6b0-f51c-4f1f-842b-0b583fb9e879)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:38.973862 env[1457]: time="2025-09-13T00:56:38.973795530Z" level=error msg="Failed to destroy network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.974232 env[1457]: time="2025-09-13T00:56:38.974187324Z" level=error msg="encountered an error cleaning up failed sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.974315 env[1457]: time="2025-09-13T00:56:38.974259924Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-cdfz4,Uid:7264b389-b98c-40ac-b232-ce7a430c65aa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.974740 kubelet[2493]: E0913 00:56:38.974503 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.974740 kubelet[2493]: E0913 00:56:38.974580 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-cdfz4" Sep 13 00:56:38.974740 kubelet[2493]: E0913 00:56:38.974625 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-cdfz4" Sep 13 00:56:38.974925 kubelet[2493]: E0913 00:56:38.974699 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-54d579b49d-cdfz4_calico-system(7264b389-b98c-40ac-b232-ce7a430c65aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-54d579b49d-cdfz4_calico-system(7264b389-b98c-40ac-b232-ce7a430c65aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-cdfz4" podUID="7264b389-b98c-40ac-b232-ce7a430c65aa" Sep 13 00:56:38.990675 env[1457]: time="2025-09-13T00:56:38.990621315Z" level=error msg="Failed to destroy network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.991046 env[1457]: time="2025-09-13T00:56:38.991003110Z" level=error msg="encountered an error cleaning up failed sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.991124 env[1457]: time="2025-09-13T00:56:38.991071909Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687cd554b6-dlwkd,Uid:502d5c2b-eda9-42cc-894a-209da2a4fe8a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.991307 kubelet[2493]: E0913 00:56:38.991266 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:38.991402 kubelet[2493]: E0913 00:56:38.991331 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" Sep 13 00:56:38.991402 kubelet[2493]: E0913 00:56:38.991355 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" Sep 13 00:56:38.991486 kubelet[2493]: E0913 00:56:38.991403 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-687cd554b6-dlwkd_calico-system(502d5c2b-eda9-42cc-894a-209da2a4fe8a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-687cd554b6-dlwkd_calico-system(502d5c2b-eda9-42cc-894a-209da2a4fe8a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" podUID="502d5c2b-eda9-42cc-894a-209da2a4fe8a" Sep 13 00:56:39.016206 env[1457]: time="2025-09-13T00:56:39.016121691Z" level=error msg="Failed to destroy network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.017109 env[1457]: time="2025-09-13T00:56:39.017050379Z" level=error msg="encountered an error cleaning up failed sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.017297 env[1457]: time="2025-09-13T00:56:39.017248577Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-55b5cf7bc9-pphsm,Uid:0b5d6a78-1934-4316-851c-6c8a15133340,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.017692 kubelet[2493]: E0913 00:56:39.017591 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.017692 kubelet[2493]: E0913 00:56:39.017659 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-55b5cf7bc9-pphsm" Sep 13 00:56:39.017928 kubelet[2493]: E0913 00:56:39.017858 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-55b5cf7bc9-pphsm" Sep 13 00:56:39.018086 kubelet[2493]: E0913 00:56:39.017986 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-55b5cf7bc9-pphsm_calico-system(0b5d6a78-1934-4316-851c-6c8a15133340)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-55b5cf7bc9-pphsm_calico-system(0b5d6a78-1934-4316-851c-6c8a15133340)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-55b5cf7bc9-pphsm" podUID="0b5d6a78-1934-4316-851c-6c8a15133340" Sep 13 00:56:39.020104 env[1457]: time="2025-09-13T00:56:39.020059941Z" level=error msg="Failed to destroy network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.020654 env[1457]: time="2025-09-13T00:56:39.020618634Z" level=error msg="encountered an error cleaning up failed sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.020817 env[1457]: time="2025-09-13T00:56:39.020785832Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-vmgr4,Uid:dc0f281d-1747-48f1-a1ba-e361ef4367c0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.021756 kubelet[2493]: E0913 00:56:39.021658 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.021843 kubelet[2493]: E0913 00:56:39.021772 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" Sep 13 00:56:39.021843 kubelet[2493]: E0913 00:56:39.021797 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" Sep 13 00:56:39.021923 kubelet[2493]: E0913 00:56:39.021840 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-756d6c885f-vmgr4_calico-apiserver(dc0f281d-1747-48f1-a1ba-e361ef4367c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-756d6c885f-vmgr4_calico-apiserver(dc0f281d-1747-48f1-a1ba-e361ef4367c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" podUID="dc0f281d-1747-48f1-a1ba-e361ef4367c0" Sep 13 00:56:39.022879 env[1457]: time="2025-09-13T00:56:39.022098415Z" level=error msg="Failed to destroy network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.023356 env[1457]: time="2025-09-13T00:56:39.023316400Z" level=error msg="encountered an error cleaning up failed sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.023539 env[1457]: time="2025-09-13T00:56:39.023479698Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-gm4lp,Uid:f64e1518-9dc7-4135-aa11-2d5bffea4ae3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.024005 kubelet[2493]: E0913 00:56:39.023787 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.024005 kubelet[2493]: E0913 00:56:39.023845 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" Sep 13 00:56:39.024005 kubelet[2493]: E0913 00:56:39.023869 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" Sep 13 00:56:39.024176 kubelet[2493]: E0913 00:56:39.023932 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-756d6c885f-gm4lp_calico-apiserver(f64e1518-9dc7-4135-aa11-2d5bffea4ae3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-756d6c885f-gm4lp_calico-apiserver(f64e1518-9dc7-4135-aa11-2d5bffea4ae3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" podUID="f64e1518-9dc7-4135-aa11-2d5bffea4ae3" Sep 13 00:56:39.029678 env[1457]: time="2025-09-13T00:56:39.029639220Z" level=error msg="Failed to destroy network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.030111 env[1457]: time="2025-09-13T00:56:39.030073215Z" level=error msg="encountered an error cleaning up failed sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.030276 env[1457]: time="2025-09-13T00:56:39.030230613Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-p4jmt,Uid:36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.030537 kubelet[2493]: E0913 00:56:39.030480 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.030623 kubelet[2493]: E0913 00:56:39.030544 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-p4jmt" Sep 13 00:56:39.030623 kubelet[2493]: E0913 00:56:39.030568 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-p4jmt" Sep 13 00:56:39.030711 kubelet[2493]: E0913 00:56:39.030617 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-p4jmt_kube-system(36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-p4jmt_kube-system(36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-p4jmt" podUID="36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d" Sep 13 00:56:39.031584 env[1457]: time="2025-09-13T00:56:39.031549296Z" level=error msg="Failed to destroy network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.031847 env[1457]: time="2025-09-13T00:56:39.031820193Z" level=error msg="encountered an error cleaning up failed sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.032430 env[1457]: time="2025-09-13T00:56:39.031864092Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fdb94b7b4-b7x7p,Uid:3ee92753-0503-4301-9dd8-260e451cee11,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.032533 kubelet[2493]: E0913 00:56:39.032057 2493 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.032533 kubelet[2493]: E0913 00:56:39.032115 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" Sep 13 00:56:39.032533 kubelet[2493]: E0913 00:56:39.032138 2493 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" Sep 13 00:56:39.033480 kubelet[2493]: E0913 00:56:39.032203 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7fdb94b7b4-b7x7p_calico-apiserver(3ee92753-0503-4301-9dd8-260e451cee11)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7fdb94b7b4-b7x7p_calico-apiserver(3ee92753-0503-4301-9dd8-260e451cee11)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" podUID="3ee92753-0503-4301-9dd8-260e451cee11" Sep 13 00:56:39.038301 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf-shm.mount: Deactivated successfully. Sep 13 00:56:39.038419 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46-shm.mount: Deactivated successfully. Sep 13 00:56:39.038492 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022-shm.mount: Deactivated successfully. Sep 13 00:56:39.435613 kubelet[2493]: I0913 00:56:39.435584 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:56:39.436478 env[1457]: time="2025-09-13T00:56:39.436443084Z" level=info msg="StopPodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\"" Sep 13 00:56:39.438684 kubelet[2493]: I0913 00:56:39.438313 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:56:39.438852 env[1457]: time="2025-09-13T00:56:39.438824254Z" level=info msg="StopPodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\"" Sep 13 00:56:39.439942 kubelet[2493]: I0913 00:56:39.439619 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:56:39.440173 env[1457]: time="2025-09-13T00:56:39.440148637Z" level=info msg="StopPodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\"" Sep 13 00:56:39.441706 kubelet[2493]: I0913 00:56:39.441348 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:56:39.441992 env[1457]: time="2025-09-13T00:56:39.441964714Z" level=info msg="StopPodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\"" Sep 13 00:56:39.445066 kubelet[2493]: I0913 00:56:39.444724 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:56:39.445450 env[1457]: time="2025-09-13T00:56:39.445421070Z" level=info msg="StopPodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\"" Sep 13 00:56:39.447922 kubelet[2493]: I0913 00:56:39.447231 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:56:39.448172 env[1457]: time="2025-09-13T00:56:39.448131836Z" level=info msg="StopPodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\"" Sep 13 00:56:39.449669 kubelet[2493]: I0913 00:56:39.449342 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:56:39.449909 env[1457]: time="2025-09-13T00:56:39.449878614Z" level=info msg="StopPodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\"" Sep 13 00:56:39.451774 kubelet[2493]: I0913 00:56:39.451756 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:56:39.452486 env[1457]: time="2025-09-13T00:56:39.452461681Z" level=info msg="StopPodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\"" Sep 13 00:56:39.453989 kubelet[2493]: I0913 00:56:39.453710 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:56:39.454139 env[1457]: time="2025-09-13T00:56:39.454110161Z" level=info msg="StopPodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\"" Sep 13 00:56:39.510812 env[1457]: time="2025-09-13T00:56:39.510751845Z" level=error msg="StopPodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" failed" error="failed to destroy network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.511116 kubelet[2493]: E0913 00:56:39.511083 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:56:39.511207 kubelet[2493]: E0913 00:56:39.511141 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022"} Sep 13 00:56:39.511257 kubelet[2493]: E0913 00:56:39.511221 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.511335 kubelet[2493]: E0913 00:56:39.511254 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-ll9c8" podUID="bdc39956-1ca6-45f4-86e0-ace05fcdfaf5" Sep 13 00:56:39.552294 env[1457]: time="2025-09-13T00:56:39.552223622Z" level=error msg="StopPodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" failed" error="failed to destroy network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.552965 kubelet[2493]: E0913 00:56:39.552787 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:56:39.552965 kubelet[2493]: E0913 00:56:39.552841 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46"} Sep 13 00:56:39.552965 kubelet[2493]: E0913 00:56:39.552895 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.552965 kubelet[2493]: E0913 00:56:39.552930 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8743e6b0-f51c-4f1f-842b-0b583fb9e879\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4vpwd" podUID="8743e6b0-f51c-4f1f-842b-0b583fb9e879" Sep 13 00:56:39.615717 env[1457]: time="2025-09-13T00:56:39.615639121Z" level=error msg="StopPodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" failed" error="failed to destroy network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.615965 kubelet[2493]: E0913 00:56:39.615918 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:56:39.616053 kubelet[2493]: E0913 00:56:39.615985 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d"} Sep 13 00:56:39.616106 kubelet[2493]: E0913 00:56:39.616072 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.616188 kubelet[2493]: E0913 00:56:39.616127 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-p4jmt" podUID="36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d" Sep 13 00:56:39.621464 env[1457]: time="2025-09-13T00:56:39.621414048Z" level=error msg="StopPodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" failed" error="failed to destroy network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.621822 kubelet[2493]: E0913 00:56:39.621767 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:56:39.623228 kubelet[2493]: E0913 00:56:39.621847 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80"} Sep 13 00:56:39.623228 kubelet[2493]: E0913 00:56:39.621889 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.623228 kubelet[2493]: E0913 00:56:39.621929 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" podUID="f64e1518-9dc7-4135-aa11-2d5bffea4ae3" Sep 13 00:56:39.649116 env[1457]: time="2025-09-13T00:56:39.649059299Z" level=error msg="StopPodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" failed" error="failed to destroy network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.649383 kubelet[2493]: E0913 00:56:39.649350 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:56:39.649460 kubelet[2493]: E0913 00:56:39.649410 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1"} Sep 13 00:56:39.649505 kubelet[2493]: E0913 00:56:39.649451 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7264b389-b98c-40ac-b232-ce7a430c65aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.649621 kubelet[2493]: E0913 00:56:39.649495 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7264b389-b98c-40ac-b232-ce7a430c65aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-cdfz4" podUID="7264b389-b98c-40ac-b232-ce7a430c65aa" Sep 13 00:56:39.686565 env[1457]: time="2025-09-13T00:56:39.685993833Z" level=error msg="StopPodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" failed" error="failed to destroy network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.687114 kubelet[2493]: E0913 00:56:39.686996 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:56:39.687211 kubelet[2493]: E0913 00:56:39.687140 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf"} Sep 13 00:56:39.687211 kubelet[2493]: E0913 00:56:39.687202 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b5d6a78-1934-4316-851c-6c8a15133340\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.687335 kubelet[2493]: E0913 00:56:39.687233 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b5d6a78-1934-4316-851c-6c8a15133340\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-55b5cf7bc9-pphsm" podUID="0b5d6a78-1934-4316-851c-6c8a15133340" Sep 13 00:56:39.688289 env[1457]: time="2025-09-13T00:56:39.688245204Z" level=error msg="StopPodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" failed" error="failed to destroy network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.688655 kubelet[2493]: E0913 00:56:39.688615 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:56:39.688738 kubelet[2493]: E0913 00:56:39.688658 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a"} Sep 13 00:56:39.688738 kubelet[2493]: E0913 00:56:39.688721 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.688841 kubelet[2493]: E0913 00:56:39.688758 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" podUID="dc0f281d-1747-48f1-a1ba-e361ef4367c0" Sep 13 00:56:39.690381 env[1457]: time="2025-09-13T00:56:39.690300378Z" level=error msg="StopPodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" failed" error="failed to destroy network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.690605 kubelet[2493]: E0913 00:56:39.690565 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:56:39.690674 kubelet[2493]: E0913 00:56:39.690617 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf"} Sep 13 00:56:39.690674 kubelet[2493]: E0913 00:56:39.690654 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"502d5c2b-eda9-42cc-894a-209da2a4fe8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.690779 kubelet[2493]: E0913 00:56:39.690682 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"502d5c2b-eda9-42cc-894a-209da2a4fe8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" podUID="502d5c2b-eda9-42cc-894a-209da2a4fe8a" Sep 13 00:56:39.691648 env[1457]: time="2025-09-13T00:56:39.691608862Z" level=error msg="StopPodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" failed" error="failed to destroy network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:56:39.691969 kubelet[2493]: E0913 00:56:39.691842 2493 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:56:39.691969 kubelet[2493]: E0913 00:56:39.691877 2493 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7"} Sep 13 00:56:39.691969 kubelet[2493]: E0913 00:56:39.691909 2493 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3ee92753-0503-4301-9dd8-260e451cee11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:56:39.691969 kubelet[2493]: E0913 00:56:39.691937 2493 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3ee92753-0503-4301-9dd8-260e451cee11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" podUID="3ee92753-0503-4301-9dd8-260e451cee11" Sep 13 00:56:45.544593 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4252273746.mount: Deactivated successfully. Sep 13 00:56:45.587187 env[1457]: time="2025-09-13T00:56:45.587132711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:45.593017 env[1457]: time="2025-09-13T00:56:45.592981942Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:45.596414 env[1457]: time="2025-09-13T00:56:45.596385402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:45.599320 env[1457]: time="2025-09-13T00:56:45.599289967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:45.599720 env[1457]: time="2025-09-13T00:56:45.599686563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:56:45.618363 env[1457]: time="2025-09-13T00:56:45.618329542Z" level=info msg="CreateContainer within sandbox \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:56:45.653193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3678850779.mount: Deactivated successfully. Sep 13 00:56:45.666067 env[1457]: time="2025-09-13T00:56:45.666018479Z" level=info msg="CreateContainer within sandbox \"05c91f3814e67ea6d6c8a0fe21ef62c990c7174284d53aded29f31840495f164\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af\"" Sep 13 00:56:45.666713 env[1457]: time="2025-09-13T00:56:45.666672971Z" level=info msg="StartContainer for \"0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af\"" Sep 13 00:56:45.690509 systemd[1]: Started cri-containerd-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af.scope. Sep 13 00:56:45.727443 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 13 00:56:45.727655 kernel: audit: type=1400 audit(1757725005.707:982): avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4ef8668cc8 items=0 ppid=2975 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653765616538396234313139373135626135663163663130626434 Sep 13 00:56:45.768006 kernel: audit: type=1300 audit(1757725005.707:982): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4ef8668cc8 items=0 ppid=2975 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:45.768118 kernel: audit: type=1327 audit(1757725005.707:982): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653765616538396234313139373135626135663163663130626434 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.796936 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.797064 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.798162 env[1457]: time="2025-09-13T00:56:45.797450127Z" level=info msg="StartContainer for \"0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af\" returns successfully" Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.826682 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.826782 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.841968 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.854794 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.869597 kernel: audit: type=1400 audit(1757725005.707:983): avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.707000 audit: BPF prog-id=134 op=LOAD Sep 13 00:56:45.707000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00027bc58 items=0 ppid=2975 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653765616538396234313139373135626135663163663130626434 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit: BPF prog-id=135 op=LOAD Sep 13 00:56:45.726000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00027bca8 items=0 ppid=2975 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:45.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653765616538396234313139373135626135663163663130626434 Sep 13 00:56:45.726000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:56:45.726000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:45.726000 audit: BPF prog-id=136 op=LOAD Sep 13 00:56:45.726000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00027bd38 items=0 ppid=2975 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:45.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653765616538396234313139373135626135663163663130626434 Sep 13 00:56:45.948316 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:56:45.948447 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:56:46.050508 env[1457]: time="2025-09-13T00:56:46.050383345Z" level=info msg="StopPodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\"" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.150 [INFO][3711] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.150 [INFO][3711] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" iface="eth0" netns="/var/run/netns/cni-e67f64e4-9fe2-41f9-d947-b2512076ab9f" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.151 [INFO][3711] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" iface="eth0" netns="/var/run/netns/cni-e67f64e4-9fe2-41f9-d947-b2512076ab9f" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.151 [INFO][3711] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" iface="eth0" netns="/var/run/netns/cni-e67f64e4-9fe2-41f9-d947-b2512076ab9f" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.151 [INFO][3711] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.151 [INFO][3711] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.196 [INFO][3724] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.197 [INFO][3724] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.197 [INFO][3724] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.206 [WARNING][3724] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.206 [INFO][3724] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.207 [INFO][3724] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:46.212651 env[1457]: 2025-09-13 00:56:46.211 [INFO][3711] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:56:46.213230 env[1457]: time="2025-09-13T00:56:46.212778046Z" level=info msg="TearDown network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" successfully" Sep 13 00:56:46.213230 env[1457]: time="2025-09-13T00:56:46.212817646Z" level=info msg="StopPodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" returns successfully" Sep 13 00:56:46.301781 kubelet[2493]: I0913 00:56:46.301505 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vfpl5\" (UniqueName: \"kubernetes.io/projected/0b5d6a78-1934-4316-851c-6c8a15133340-kube-api-access-vfpl5\") pod \"0b5d6a78-1934-4316-851c-6c8a15133340\" (UID: \"0b5d6a78-1934-4316-851c-6c8a15133340\") " Sep 13 00:56:46.302613 kubelet[2493]: I0913 00:56:46.302583 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "0b5d6a78-1934-4316-851c-6c8a15133340" (UID: "0b5d6a78-1934-4316-851c-6c8a15133340"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Sep 13 00:56:46.302827 kubelet[2493]: I0913 00:56:46.302785 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-ca-bundle\") pod \"0b5d6a78-1934-4316-851c-6c8a15133340\" (UID: \"0b5d6a78-1934-4316-851c-6c8a15133340\") " Sep 13 00:56:46.303101 kubelet[2493]: I0913 00:56:46.303085 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-backend-key-pair\") pod \"0b5d6a78-1934-4316-851c-6c8a15133340\" (UID: \"0b5d6a78-1934-4316-851c-6c8a15133340\") " Sep 13 00:56:46.303874 kubelet[2493]: I0913 00:56:46.303856 2493 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-ca-bundle\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:56:46.306031 kubelet[2493]: I0913 00:56:46.306006 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0b5d6a78-1934-4316-851c-6c8a15133340-kube-api-access-vfpl5" (OuterVolumeSpecName: "kube-api-access-vfpl5") pod "0b5d6a78-1934-4316-851c-6c8a15133340" (UID: "0b5d6a78-1934-4316-851c-6c8a15133340"). InnerVolumeSpecName "kube-api-access-vfpl5". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:56:46.307420 kubelet[2493]: I0913 00:56:46.307395 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "0b5d6a78-1934-4316-851c-6c8a15133340" (UID: "0b5d6a78-1934-4316-851c-6c8a15133340"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:56:46.408622 kubelet[2493]: I0913 00:56:46.408582 2493 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-vfpl5\" (UniqueName: \"kubernetes.io/projected/0b5d6a78-1934-4316-851c-6c8a15133340-kube-api-access-vfpl5\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:56:46.408622 kubelet[2493]: I0913 00:56:46.408613 2493 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0b5d6a78-1934-4316-851c-6c8a15133340-whisker-backend-key-pair\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:56:46.478141 systemd[1]: Removed slice kubepods-besteffort-pod0b5d6a78_1934_4316_851c_6c8a15133340.slice. Sep 13 00:56:46.498281 kubelet[2493]: I0913 00:56:46.498203 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-hrdfd" podStartSLOduration=1.7278125229999999 podStartE2EDuration="21.49818391s" podCreationTimestamp="2025-09-13 00:56:25 +0000 UTC" firstStartedPulling="2025-09-13 00:56:25.830226465 +0000 UTC m=+23.238494729" lastFinishedPulling="2025-09-13 00:56:45.600597852 +0000 UTC m=+43.008866116" observedRunningTime="2025-09-13 00:56:46.49730292 +0000 UTC m=+43.905571084" watchObservedRunningTime="2025-09-13 00:56:46.49818391 +0000 UTC m=+43.906452174" Sep 13 00:56:46.545936 systemd[1]: run-netns-cni\x2de67f64e4\x2d9fe2\x2d41f9\x2dd947\x2db2512076ab9f.mount: Deactivated successfully. Sep 13 00:56:46.546376 systemd[1]: var-lib-kubelet-pods-0b5d6a78\x2d1934\x2d4316\x2d851c\x2d6c8a15133340-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvfpl5.mount: Deactivated successfully. Sep 13 00:56:46.546553 systemd[1]: var-lib-kubelet-pods-0b5d6a78\x2d1934\x2d4316\x2d851c\x2d6c8a15133340-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 13 00:56:46.592374 systemd[1]: Created slice kubepods-besteffort-pod421fbb16_843d_48dd_ade0_46c8c71f4833.slice. Sep 13 00:56:46.609956 kubelet[2493]: I0913 00:56:46.609920 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/421fbb16-843d-48dd-ade0-46c8c71f4833-whisker-backend-key-pair\") pod \"whisker-5f665888fd-pvchk\" (UID: \"421fbb16-843d-48dd-ade0-46c8c71f4833\") " pod="calico-system/whisker-5f665888fd-pvchk" Sep 13 00:56:46.610113 kubelet[2493]: I0913 00:56:46.609968 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pxghs\" (UniqueName: \"kubernetes.io/projected/421fbb16-843d-48dd-ade0-46c8c71f4833-kube-api-access-pxghs\") pod \"whisker-5f665888fd-pvchk\" (UID: \"421fbb16-843d-48dd-ade0-46c8c71f4833\") " pod="calico-system/whisker-5f665888fd-pvchk" Sep 13 00:56:46.610113 kubelet[2493]: I0913 00:56:46.610000 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/421fbb16-843d-48dd-ade0-46c8c71f4833-whisker-ca-bundle\") pod \"whisker-5f665888fd-pvchk\" (UID: \"421fbb16-843d-48dd-ade0-46c8c71f4833\") " pod="calico-system/whisker-5f665888fd-pvchk" Sep 13 00:56:46.897707 env[1457]: time="2025-09-13T00:56:46.897595540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5f665888fd-pvchk,Uid:421fbb16-843d-48dd-ade0-46c8c71f4833,Namespace:calico-system,Attempt:0,}" Sep 13 00:56:47.053570 systemd-networkd[1604]: cali1cc6090b297: Link UP Sep 13 00:56:47.066080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:56:47.066203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1cc6090b297: link becomes ready Sep 13 00:56:47.066195 systemd-networkd[1604]: cali1cc6090b297: Gained carrier Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:46.969 [INFO][3746] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:46.979 [INFO][3746] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0 whisker-5f665888fd- calico-system 421fbb16-843d-48dd-ade0-46c8c71f4833 899 0 2025-09-13 00:56:46 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:5f665888fd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 whisker-5f665888fd-pvchk eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali1cc6090b297 [] [] }} ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:46.979 [INFO][3746] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.003 [INFO][3759] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" HandleID="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.003 [INFO][3759] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" HandleID="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-0eeb704727", "pod":"whisker-5f665888fd-pvchk", "timestamp":"2025-09-13 00:56:47.003655101 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.004 [INFO][3759] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.004 [INFO][3759] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.004 [INFO][3759] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.009 [INFO][3759] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.012 [INFO][3759] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.019 [INFO][3759] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.021 [INFO][3759] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.023 [INFO][3759] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.023 [INFO][3759] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.024 [INFO][3759] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.028 [INFO][3759] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.038 [INFO][3759] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.65/26] block=192.168.113.64/26 handle="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.038 [INFO][3759] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.65/26] handle="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.038 [INFO][3759] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:47.087088 env[1457]: 2025-09-13 00:56:47.039 [INFO][3759] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.65/26] IPv6=[] ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" HandleID="k8s-pod-network.915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.088004 env[1457]: 2025-09-13 00:56:47.040 [INFO][3746] cni-plugin/k8s.go 418: Populated endpoint ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0", GenerateName:"whisker-5f665888fd-", Namespace:"calico-system", SelfLink:"", UID:"421fbb16-843d-48dd-ade0-46c8c71f4833", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5f665888fd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"whisker-5f665888fd-pvchk", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1cc6090b297", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:47.088004 env[1457]: 2025-09-13 00:56:47.040 [INFO][3746] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.65/32] ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.088004 env[1457]: 2025-09-13 00:56:47.041 [INFO][3746] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1cc6090b297 ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.088004 env[1457]: 2025-09-13 00:56:47.067 [INFO][3746] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.088004 env[1457]: 2025-09-13 00:56:47.067 [INFO][3746] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0", GenerateName:"whisker-5f665888fd-", Namespace:"calico-system", SelfLink:"", UID:"421fbb16-843d-48dd-ade0-46c8c71f4833", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5f665888fd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede", Pod:"whisker-5f665888fd-pvchk", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1cc6090b297", MAC:"ba:fd:c6:85:64:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:47.088004 env[1457]: 2025-09-13 00:56:47.083 [INFO][3746] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede" Namespace="calico-system" Pod="whisker-5f665888fd-pvchk" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--5f665888fd--pvchk-eth0" Sep 13 00:56:47.098991 env[1457]: time="2025-09-13T00:56:47.098613402Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:47.098991 env[1457]: time="2025-09-13T00:56:47.098669301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:47.098991 env[1457]: time="2025-09-13T00:56:47.098688301Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:47.098991 env[1457]: time="2025-09-13T00:56:47.098912498Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede pid=3780 runtime=io.containerd.runc.v2 Sep 13 00:56:47.115378 systemd[1]: Started cri-containerd-915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede.scope. Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit: BPF prog-id=137 op=LOAD Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3780 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356363303931653066386136613031653164333863303634363561 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3780 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356363303931653066386136613031653164333863303634363561 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.129000 audit: BPF prog-id=138 op=LOAD Sep 13 00:56:47.129000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000311510 items=0 ppid=3780 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356363303931653066386136613031653164333863303634363561 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit: BPF prog-id=139 op=LOAD Sep 13 00:56:47.130000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000311558 items=0 ppid=3780 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356363303931653066386136613031653164333863303634363561 Sep 13 00:56:47.130000 audit: BPF prog-id=139 op=UNLOAD Sep 13 00:56:47.130000 audit: BPF prog-id=138 op=UNLOAD Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.130000 audit: BPF prog-id=140 op=LOAD Sep 13 00:56:47.130000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000311968 items=0 ppid=3780 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356363303931653066386136613031653164333863303634363561 Sep 13 00:56:47.159393 env[1457]: time="2025-09-13T00:56:47.159280300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5f665888fd-pvchk,Uid:421fbb16-843d-48dd-ade0-46c8c71f4833,Namespace:calico-system,Attempt:0,} returns sandbox id \"915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede\"" Sep 13 00:56:47.163560 env[1457]: time="2025-09-13T00:56:47.163181455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 13 00:56:47.316148 kubelet[2493]: I0913 00:56:47.316094 2493 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="0b5d6a78-1934-4316-851c-6c8a15133340" path="/var/lib/kubelet/pods/0b5d6a78-1934-4316-851c-6c8a15133340/volumes" Sep 13 00:56:47.373000 audit[3855]: AVC avc: denied { write } for pid=3855 comm="tee" name="fd" dev="proc" ino=31011 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.373000 audit[3855]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeede997cb a2=241 a3=1b6 items=1 ppid=3825 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.373000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:56:47.373000 audit: PATH item=0 name="/dev/fd/63" inode=31886 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.373000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.387000 audit[3858]: AVC avc: denied { write } for pid=3858 comm="tee" name="fd" dev="proc" ino=31019 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.387000 audit[3858]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5e7ed7cd a2=241 a3=1b6 items=1 ppid=3822 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.396000 audit[3860]: AVC avc: denied { write } for pid=3860 comm="tee" name="fd" dev="proc" ino=31025 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.399000 audit[3870]: AVC avc: denied { write } for pid=3870 comm="tee" name="fd" dev="proc" ino=31031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.401000 audit[3868]: AVC avc: denied { write } for pid=3868 comm="tee" name="fd" dev="proc" ino=31032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.399000 audit[3870]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecacc57bc a2=241 a3=1b6 items=1 ppid=3832 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.401000 audit[3868]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef2c6e7cb a2=241 a3=1b6 items=1 ppid=3837 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.401000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:56:47.401000 audit: PATH item=0 name="/dev/fd/63" inode=31891 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.399000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:56:47.399000 audit: PATH item=0 name="/dev/fd/63" inode=31006 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.399000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.387000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:56:47.387000 audit: PATH item=0 name="/dev/fd/63" inode=30992 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.396000 audit[3860]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe971167cc a2=241 a3=1b6 items=1 ppid=3821 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.396000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:56:47.396000 audit: PATH item=0 name="/dev/fd/63" inode=30997 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.396000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.414000 audit[3892]: AVC avc: denied { write } for pid=3892 comm="tee" name="fd" dev="proc" ino=31039 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.414000 audit[3892]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc6f6f7cb a2=241 a3=1b6 items=1 ppid=3848 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.414000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:56:47.414000 audit: PATH item=0 name="/dev/fd/63" inode=31028 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.414000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.451000 audit[3898]: AVC avc: denied { write } for pid=3898 comm="tee" name="fd" dev="proc" ino=31898 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:56:47.451000 audit[3898]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8c32f7bb a2=241 a3=1b6 items=1 ppid=3828 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.451000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:56:47.451000 audit: PATH item=0 name="/dev/fd/63" inode=31041 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:47.451000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.696000 audit: BPF prog-id=141 op=LOAD Sep 13 00:56:47.696000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdd173590 a2=98 a3=1fffffffffffffff items=0 ppid=3830 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.696000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:56:47.698000 audit: BPF prog-id=141 op=UNLOAD Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit: BPF prog-id=142 op=LOAD Sep 13 00:56:47.698000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdd173470 a2=94 a3=3 items=0 ppid=3830 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.698000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:56:47.698000 audit: BPF prog-id=142 op=UNLOAD Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.698000 audit: BPF prog-id=143 op=LOAD Sep 13 00:56:47.698000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdd1734b0 a2=94 a3=7ffcdd173690 items=0 ppid=3830 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.698000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:56:47.699000 audit: BPF prog-id=143 op=UNLOAD Sep 13 00:56:47.699000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.699000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcdd173580 a2=50 a3=a000000085 items=0 ppid=3830 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.699000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.701000 audit: BPF prog-id=144 op=LOAD Sep 13 00:56:47.701000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed53b4d90 a2=98 a3=3 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.701000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.702000 audit: BPF prog-id=144 op=UNLOAD Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit: BPF prog-id=145 op=LOAD Sep 13 00:56:47.702000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed53b4b80 a2=94 a3=54428f items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.702000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.702000 audit: BPF prog-id=145 op=UNLOAD Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.702000 audit: BPF prog-id=146 op=LOAD Sep 13 00:56:47.702000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed53b4bb0 a2=94 a3=2 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.702000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.702000 audit: BPF prog-id=146 op=UNLOAD Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.813000 audit: BPF prog-id=147 op=LOAD Sep 13 00:56:47.813000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed53b4a70 a2=94 a3=1 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.814000 audit: BPF prog-id=147 op=UNLOAD Sep 13 00:56:47.814000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.814000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffed53b4b40 a2=50 a3=7ffed53b4c20 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.814000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed53b4a80 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed53b4ab0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed53b49c0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed53b4ad0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed53b4ab0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed53b4aa0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed53b4ad0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed53b4ab0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed53b4ad0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed53b4aa0 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed53b4b10 a2=28 a3=0 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffed53b48c0 a2=50 a3=1 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit: BPF prog-id=148 op=LOAD Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed53b48c0 a2=94 a3=5 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit: BPF prog-id=148 op=UNLOAD Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffed53b4970 a2=50 a3=1 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffed53b4a90 a2=4 a3=38 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.823000 audit[3931]: AVC avc: denied { confidentiality } for pid=3931 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:47.823000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffed53b4ae0 a2=94 a3=6 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { confidentiality } for pid=3931 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:47.824000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffed53b4290 a2=94 a3=88 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.824000 audit[3931]: AVC avc: denied { confidentiality } for pid=3931 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:47.824000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffed53b4290 a2=94 a3=88 items=0 ppid=3830 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit: BPF prog-id=149 op=LOAD Sep 13 00:56:47.832000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0cea66a0 a2=98 a3=1999999999999999 items=0 ppid=3830 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.832000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:56:47.832000 audit: BPF prog-id=149 op=UNLOAD Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit: BPF prog-id=150 op=LOAD Sep 13 00:56:47.832000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0cea6580 a2=94 a3=ffff items=0 ppid=3830 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.832000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:56:47.832000 audit: BPF prog-id=150 op=UNLOAD Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.832000 audit: BPF prog-id=151 op=LOAD Sep 13 00:56:47.832000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0cea65c0 a2=94 a3=7ffe0cea67a0 items=0 ppid=3830 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.832000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:56:47.832000 audit: BPF prog-id=151 op=UNLOAD Sep 13 00:56:47.922569 systemd-networkd[1604]: vxlan.calico: Link UP Sep 13 00:56:47.922578 systemd-networkd[1604]: vxlan.calico: Gained carrier Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit: BPF prog-id=152 op=LOAD Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc277bd350 a2=98 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit: BPF prog-id=152 op=UNLOAD Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit: BPF prog-id=153 op=LOAD Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc277bd160 a2=94 a3=54428f items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit: BPF prog-id=153 op=UNLOAD Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit: BPF prog-id=154 op=LOAD Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc277bd190 a2=94 a3=2 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit: BPF prog-id=154 op=UNLOAD Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc277bd060 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc277bd090 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc277bcfa0 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc277bd0b0 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc277bd090 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc277bd080 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc277bd0b0 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc277bd090 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc277bd0b0 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc277bd080 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.950000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.950000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc277bd0f0 a2=28 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit: BPF prog-id=155 op=LOAD Sep 13 00:56:47.954000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc277bcf60 a2=94 a3=0 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.954000 audit: BPF prog-id=155 op=UNLOAD Sep 13 00:56:47.954000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.954000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc277bcf50 a2=50 a3=2800 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc277bcf50 a2=50 a3=2800 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit: BPF prog-id=156 op=LOAD Sep 13 00:56:47.959000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc277bc770 a2=94 a3=2 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.959000 audit: BPF prog-id=156 op=UNLOAD Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.959000 audit: BPF prog-id=157 op=LOAD Sep 13 00:56:47.959000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc277bc870 a2=94 a3=30 items=0 ppid=3830 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.967000 audit: BPF prog-id=158 op=LOAD Sep 13 00:56:47.967000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5b810ea0 a2=98 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:47.968000 audit: BPF prog-id=158 op=UNLOAD Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit: BPF prog-id=159 op=LOAD Sep 13 00:56:47.968000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd5b810c90 a2=94 a3=54428f items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:47.968000 audit: BPF prog-id=159 op=UNLOAD Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:47.968000 audit: BPF prog-id=160 op=LOAD Sep 13 00:56:47.968000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd5b810cc0 a2=94 a3=2 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:47.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:47.968000 audit: BPF prog-id=160 op=UNLOAD Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit: BPF prog-id=161 op=LOAD Sep 13 00:56:48.087000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd5b810b80 a2=94 a3=1 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.087000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.087000 audit: BPF prog-id=161 op=UNLOAD Sep 13 00:56:48.087000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.087000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd5b810c50 a2=50 a3=7ffd5b810d30 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.087000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5b810b90 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5b810bc0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5b810ad0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5b810be0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5b810bc0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5b810bb0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5b810be0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5b810bc0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5b810be0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5b810bb0 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5b810c20 a2=28 a3=0 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd5b8109d0 a2=50 a3=1 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit: BPF prog-id=162 op=LOAD Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5b8109d0 a2=94 a3=5 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit: BPF prog-id=162 op=UNLOAD Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd5b810a80 a2=50 a3=1 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd5b810ba0 a2=4 a3=38 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.097000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:48.097000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd5b810bf0 a2=94 a3=6 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:48.098000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd5b8103a0 a2=94 a3=88 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:48.098000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd5b8103a0 a2=94 a3=88 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.098000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.098000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd5b811dd0 a2=10 a3=f8f00800 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.099000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.099000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd5b811c70 a2=10 a3=3 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.099000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.099000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd5b811c10 a2=10 a3=3 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.099000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.099000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd5b811c10 a2=10 a3=7 items=0 ppid=3830 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:56:48.108000 audit: BPF prog-id=157 op=UNLOAD Sep 13 00:56:48.179000 audit[3989]: NETFILTER_CFG table=mangle:108 family=2 entries=16 op=nft_register_chain pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:48.179000 audit[3989]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcdb1d9380 a2=0 a3=7ffcdb1d936c items=0 ppid=3830 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.179000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:48.194000 audit[3990]: NETFILTER_CFG table=nat:109 family=2 entries=15 op=nft_register_chain pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:48.194000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdbb388a20 a2=0 a3=7ffdbb388a0c items=0 ppid=3830 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.194000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:48.207000 audit[3988]: NETFILTER_CFG table=raw:110 family=2 entries=21 op=nft_register_chain pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:48.207000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcf861a6a0 a2=0 a3=7ffcf861a68c items=0 ppid=3830 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.207000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:48.214000 audit[3994]: NETFILTER_CFG table=filter:111 family=2 entries=94 op=nft_register_chain pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:48.214000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7fff616b7a60 a2=0 a3=7fff616b7a4c items=0 ppid=3830 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.214000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:48.589087 env[1457]: time="2025-09-13T00:56:48.588682524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:48.594605 env[1457]: time="2025-09-13T00:56:48.594568657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:48.598674 env[1457]: time="2025-09-13T00:56:48.598643310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:48.602263 env[1457]: time="2025-09-13T00:56:48.602228569Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:48.602779 env[1457]: time="2025-09-13T00:56:48.602747263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 13 00:56:48.606223 env[1457]: time="2025-09-13T00:56:48.606194223Z" level=info msg="CreateContainer within sandbox \"915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 13 00:56:48.645193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1095381790.mount: Deactivated successfully. Sep 13 00:56:48.658565 env[1457]: time="2025-09-13T00:56:48.658506624Z" level=info msg="CreateContainer within sandbox \"915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"0f393b418253216b81444ad5db3f95195833b9f933d518f646e8d0d2335f57d9\"" Sep 13 00:56:48.660376 env[1457]: time="2025-09-13T00:56:48.659193816Z" level=info msg="StartContainer for \"0f393b418253216b81444ad5db3f95195833b9f933d518f646e8d0d2335f57d9\"" Sep 13 00:56:48.688121 systemd[1]: Started cri-containerd-0f393b418253216b81444ad5db3f95195833b9f933d518f646e8d0d2335f57d9.scope. Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.697000 audit: BPF prog-id=163 op=LOAD Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3780 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333933623431383235333231366238313434346164356462336639 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3780 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333933623431383235333231366238313434346164356462336639 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit: BPF prog-id=164 op=LOAD Sep 13 00:56:48.698000 audit[4013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dbbf0 items=0 ppid=3780 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333933623431383235333231366238313434346164356462336639 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit: BPF prog-id=165 op=LOAD Sep 13 00:56:48.698000 audit[4013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dbc38 items=0 ppid=3780 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333933623431383235333231366238313434346164356462336639 Sep 13 00:56:48.698000 audit: BPF prog-id=165 op=UNLOAD Sep 13 00:56:48.698000 audit: BPF prog-id=164 op=UNLOAD Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { perfmon } for pid=4013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit[4013]: AVC avc: denied { bpf } for pid=4013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:48.698000 audit: BPF prog-id=166 op=LOAD Sep 13 00:56:48.698000 audit[4013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a6048 items=0 ppid=3780 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:48.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333933623431383235333231366238313434346164356462336639 Sep 13 00:56:48.731866 env[1457]: time="2025-09-13T00:56:48.731822584Z" level=info msg="StartContainer for \"0f393b418253216b81444ad5db3f95195833b9f933d518f646e8d0d2335f57d9\" returns successfully" Sep 13 00:56:48.733502 env[1457]: time="2025-09-13T00:56:48.733474365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 13 00:56:48.739000 audit[4023]: AVC avc: denied { search } for pid=4023 comm="nginx" name="crypto" dev="proc" ino=31391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c284 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:56:48.739000 audit[4023]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f304624a728 a2=0 a3=0 items=0 ppid=3780 pid=4023 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c284 key=(null) Sep 13 00:56:48.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 13 00:56:48.811704 systemd-networkd[1604]: cali1cc6090b297: Gained IPv6LL Sep 13 00:56:49.963684 systemd-networkd[1604]: vxlan.calico: Gained IPv6LL Sep 13 00:56:50.314117 env[1457]: time="2025-09-13T00:56:50.313822933Z" level=info msg="StopPodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\"" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.362 [INFO][4056] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.362 [INFO][4056] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" iface="eth0" netns="/var/run/netns/cni-f64d6a18-37ad-6d8d-5755-dfddfcb7b310" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.362 [INFO][4056] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" iface="eth0" netns="/var/run/netns/cni-f64d6a18-37ad-6d8d-5755-dfddfcb7b310" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.366 [INFO][4056] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" iface="eth0" netns="/var/run/netns/cni-f64d6a18-37ad-6d8d-5755-dfddfcb7b310" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.369 [INFO][4056] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.369 [INFO][4056] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.400 [INFO][4063] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.400 [INFO][4063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.400 [INFO][4063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.413 [WARNING][4063] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.413 [INFO][4063] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.415 [INFO][4063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:50.422082 env[1457]: 2025-09-13 00:56:50.420 [INFO][4056] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:56:50.426841 env[1457]: time="2025-09-13T00:56:50.426629565Z" level=info msg="TearDown network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" successfully" Sep 13 00:56:50.426841 env[1457]: time="2025-09-13T00:56:50.426695964Z" level=info msg="StopPodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" returns successfully" Sep 13 00:56:50.425555 systemd[1]: run-netns-cni\x2df64d6a18\x2d37ad\x2d6d8d\x2d5755\x2ddfddfcb7b310.mount: Deactivated successfully. Sep 13 00:56:50.428197 env[1457]: time="2025-09-13T00:56:50.428167048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vpwd,Uid:8743e6b0-f51c-4f1f-842b-0b583fb9e879,Namespace:calico-system,Attempt:1,}" Sep 13 00:56:50.959686 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:56:50.959806 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calideeb9cd8e7c: link becomes ready Sep 13 00:56:50.959896 systemd-networkd[1604]: calideeb9cd8e7c: Link UP Sep 13 00:56:50.965157 systemd-networkd[1604]: calideeb9cd8e7c: Gained carrier Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.830 [INFO][4069] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0 csi-node-driver- calico-system 8743e6b0-f51c-4f1f-842b-0b583fb9e879 916 0 2025-09-13 00:56:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 csi-node-driver-4vpwd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calideeb9cd8e7c [] [] }} ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.830 [INFO][4069] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.883 [INFO][4081] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" HandleID="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.883 [INFO][4081] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" HandleID="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5850), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-0eeb704727", "pod":"csi-node-driver-4vpwd", "timestamp":"2025-09-13 00:56:50.883091633 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.883 [INFO][4081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.883 [INFO][4081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.883 [INFO][4081] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.891 [INFO][4081] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.894 [INFO][4081] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.901 [INFO][4081] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.902 [INFO][4081] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.918 [INFO][4081] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.918 [INFO][4081] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.919 [INFO][4081] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.928 [INFO][4081] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.937 [INFO][4081] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.66/26] block=192.168.113.64/26 handle="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.937 [INFO][4081] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.66/26] handle="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.937 [INFO][4081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:50.981793 env[1457]: 2025-09-13 00:56:50.937 [INFO][4081] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.66/26] IPv6=[] ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" HandleID="k8s-pod-network.abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.983150 env[1457]: 2025-09-13 00:56:50.940 [INFO][4069] cni-plugin/k8s.go 418: Populated endpoint ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8743e6b0-f51c-4f1f-842b-0b583fb9e879", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"csi-node-driver-4vpwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calideeb9cd8e7c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:50.983150 env[1457]: 2025-09-13 00:56:50.940 [INFO][4069] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.66/32] ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.983150 env[1457]: 2025-09-13 00:56:50.940 [INFO][4069] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calideeb9cd8e7c ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.983150 env[1457]: 2025-09-13 00:56:50.964 [INFO][4069] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:50.983150 env[1457]: 2025-09-13 00:56:50.965 [INFO][4069] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8743e6b0-f51c-4f1f-842b-0b583fb9e879", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae", Pod:"csi-node-driver-4vpwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calideeb9cd8e7c", MAC:"2e:99:41:df:7c:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:50.983150 env[1457]: 2025-09-13 00:56:50.980 [INFO][4069] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae" Namespace="calico-system" Pod="csi-node-driver-4vpwd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:56:51.034847 kernel: kauditd_printk_skb: 707 callbacks suppressed Sep 13 00:56:51.034991 kernel: audit: type=1325 audit(1757725011.011:1134): table=filter:112 family=2 entries=36 op=nft_register_chain pid=4097 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:51.011000 audit[4097]: NETFILTER_CFG table=filter:112 family=2 entries=36 op=nft_register_chain pid=4097 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:51.035122 env[1457]: time="2025-09-13T00:56:51.011711688Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:51.035122 env[1457]: time="2025-09-13T00:56:51.011752188Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:51.035122 env[1457]: time="2025-09-13T00:56:51.011767488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:51.035122 env[1457]: time="2025-09-13T00:56:51.011888786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae pid=4104 runtime=io.containerd.runc.v2 Sep 13 00:56:51.011000 audit[4097]: SYSCALL arch=c000003e syscall=46 success=yes exit=19576 a0=3 a1=7ffdd1aa57d0 a2=0 a3=7ffdd1aa57bc items=0 ppid=3830 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.058759 kernel: audit: type=1300 audit(1757725011.011:1134): arch=c000003e syscall=46 success=yes exit=19576 a0=3 a1=7ffdd1aa57d0 a2=0 a3=7ffdd1aa57bc items=0 ppid=3830 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.058863 kernel: audit: type=1327 audit(1757725011.011:1134): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:51.011000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:51.087172 systemd[1]: Started cri-containerd-abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae.scope. Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.118605 kernel: audit: type=1400 audit(1757725011.103:1135): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.148624 kernel: audit: type=1400 audit(1757725011.103:1136): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.149012 kernel: audit: type=1400 audit(1757725011.103:1137): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.149050 kernel: audit: type=1400 audit(1757725011.103:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.179329 kernel: audit: type=1400 audit(1757725011.103:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.195752 kernel: audit: type=1400 audit(1757725011.103:1140): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.210550 kernel: audit: type=1400 audit(1757725011.103:1141): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.116000 audit: BPF prog-id=167 op=LOAD Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4104 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653761396636646330623563303866633562366663663663346232 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4104 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653761396636646330623563303866633562366663663663346232 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit: BPF prog-id=168 op=LOAD Sep 13 00:56:51.117000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000386910 items=0 ppid=4104 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653761396636646330623563303866633562366663663663346232 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit: BPF prog-id=169 op=LOAD Sep 13 00:56:51.117000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000386958 items=0 ppid=4104 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653761396636646330623563303866633562366663663663346232 Sep 13 00:56:51.117000 audit: BPF prog-id=169 op=UNLOAD Sep 13 00:56:51.117000 audit: BPF prog-id=168 op=UNLOAD Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.117000 audit: BPF prog-id=170 op=LOAD Sep 13 00:56:51.117000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000386d68 items=0 ppid=4104 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653761396636646330623563303866633562366663663663346232 Sep 13 00:56:51.215411 env[1457]: time="2025-09-13T00:56:51.215363620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vpwd,Uid:8743e6b0-f51c-4f1f-842b-0b583fb9e879,Namespace:calico-system,Attempt:1,} returns sandbox id \"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae\"" Sep 13 00:56:51.316853 env[1457]: time="2025-09-13T00:56:51.315473305Z" level=info msg="StopPodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\"" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.405 [INFO][4149] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.405 [INFO][4149] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" iface="eth0" netns="/var/run/netns/cni-920530d6-91b1-ea17-e628-690e8e2d8e96" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.405 [INFO][4149] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" iface="eth0" netns="/var/run/netns/cni-920530d6-91b1-ea17-e628-690e8e2d8e96" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.405 [INFO][4149] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" iface="eth0" netns="/var/run/netns/cni-920530d6-91b1-ea17-e628-690e8e2d8e96" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.405 [INFO][4149] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.405 [INFO][4149] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.450 [INFO][4156] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.450 [INFO][4156] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.451 [INFO][4156] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.458 [WARNING][4156] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.458 [INFO][4156] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.460 [INFO][4156] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:51.464114 env[1457]: 2025-09-13 00:56:51.462 [INFO][4149] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:56:51.471698 systemd[1]: run-netns-cni\x2d920530d6\x2d91b1\x2dea17\x2de628\x2d690e8e2d8e96.mount: Deactivated successfully. Sep 13 00:56:51.473570 env[1457]: time="2025-09-13T00:56:51.473529144Z" level=info msg="TearDown network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" successfully" Sep 13 00:56:51.473686 env[1457]: time="2025-09-13T00:56:51.473667343Z" level=info msg="StopPodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" returns successfully" Sep 13 00:56:51.474622 env[1457]: time="2025-09-13T00:56:51.474491834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-ll9c8,Uid:bdc39956-1ca6-45f4-86e0-ace05fcdfaf5,Namespace:kube-system,Attempt:1,}" Sep 13 00:56:51.681146 systemd-networkd[1604]: calif464d21f1a7: Link UP Sep 13 00:56:51.689363 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif464d21f1a7: link becomes ready Sep 13 00:56:51.688622 systemd-networkd[1604]: calif464d21f1a7: Gained carrier Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.597 [INFO][4166] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0 coredns-668d6bf9bc- kube-system bdc39956-1ca6-45f4-86e0-ace05fcdfaf5 925 0 2025-09-13 00:56:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 coredns-668d6bf9bc-ll9c8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif464d21f1a7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.597 [INFO][4166] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.632 [INFO][4174] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" HandleID="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.632 [INFO][4174] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" HandleID="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b7490), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.8-n-0eeb704727", "pod":"coredns-668d6bf9bc-ll9c8", "timestamp":"2025-09-13 00:56:51.632694771 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.633 [INFO][4174] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.633 [INFO][4174] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.633 [INFO][4174] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.640 [INFO][4174] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.645 [INFO][4174] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.649 [INFO][4174] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.651 [INFO][4174] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.653 [INFO][4174] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.653 [INFO][4174] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.655 [INFO][4174] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6 Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.665 [INFO][4174] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.675 [INFO][4174] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.67/26] block=192.168.113.64/26 handle="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.675 [INFO][4174] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.67/26] handle="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.675 [INFO][4174] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:51.717493 env[1457]: 2025-09-13 00:56:51.675 [INFO][4174] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.67/26] IPv6=[] ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" HandleID="k8s-pod-network.1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.718357 env[1457]: 2025-09-13 00:56:51.677 [INFO][4166] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"coredns-668d6bf9bc-ll9c8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif464d21f1a7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:51.718357 env[1457]: 2025-09-13 00:56:51.677 [INFO][4166] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.67/32] ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.718357 env[1457]: 2025-09-13 00:56:51.677 [INFO][4166] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif464d21f1a7 ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.718357 env[1457]: 2025-09-13 00:56:51.699 [INFO][4166] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.718357 env[1457]: 2025-09-13 00:56:51.699 [INFO][4166] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6", Pod:"coredns-668d6bf9bc-ll9c8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif464d21f1a7", MAC:"ee:35:57:26:ff:00", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:51.718357 env[1457]: 2025-09-13 00:56:51.713 [INFO][4166] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6" Namespace="kube-system" Pod="coredns-668d6bf9bc-ll9c8" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:56:51.751000 audit[4190]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:51.751000 audit[4190]: SYSCALL arch=c000003e syscall=46 success=yes exit=23740 a0=3 a1=7ffdf4804f90 a2=0 a3=7ffdf4804f7c items=0 ppid=3830 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.751000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:51.765207 env[1457]: time="2025-09-13T00:56:51.765135696Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:51.765395 env[1457]: time="2025-09-13T00:56:51.765372094Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:51.765529 env[1457]: time="2025-09-13T00:56:51.765485792Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:51.766931 env[1457]: time="2025-09-13T00:56:51.766889777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6 pid=4197 runtime=io.containerd.runc.v2 Sep 13 00:56:51.798552 systemd[1]: Started cri-containerd-1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6.scope. Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.870000 audit: BPF prog-id=171 op=LOAD Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4197 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376664356635363936666638636164656131346261643966646462 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4197 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376664356635363936666638636164656131346261643966646462 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.871000 audit: BPF prog-id=172 op=LOAD Sep 13 00:56:51.871000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000300ed0 items=0 ppid=4197 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376664356635363936666638636164656131346261643966646462 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.872000 audit: BPF prog-id=173 op=LOAD Sep 13 00:56:51.872000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300f18 items=0 ppid=4197 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376664356635363936666638636164656131346261643966646462 Sep 13 00:56:51.873000 audit: BPF prog-id=173 op=UNLOAD Sep 13 00:56:51.873000 audit: BPF prog-id=172 op=UNLOAD Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:51.873000 audit: BPF prog-id=174 op=LOAD Sep 13 00:56:51.873000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000301328 items=0 ppid=4197 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:51.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376664356635363936666638636164656131346261643966646462 Sep 13 00:56:51.938252 env[1457]: time="2025-09-13T00:56:51.938206869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-ll9c8,Uid:bdc39956-1ca6-45f4-86e0-ace05fcdfaf5,Namespace:kube-system,Attempt:1,} returns sandbox id \"1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6\"" Sep 13 00:56:51.942232 env[1457]: time="2025-09-13T00:56:51.942198024Z" level=info msg="CreateContainer within sandbox \"1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:56:51.983568 env[1457]: time="2025-09-13T00:56:51.983455065Z" level=info msg="CreateContainer within sandbox \"1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a0695d716c2c692ba4ae9eb77935e35057177a093ab5ee5b5ca390c2a2713688\"" Sep 13 00:56:51.987695 env[1457]: time="2025-09-13T00:56:51.987663718Z" level=info msg="StartContainer for \"a0695d716c2c692ba4ae9eb77935e35057177a093ab5ee5b5ca390c2a2713688\"" Sep 13 00:56:52.029075 systemd[1]: Started cri-containerd-a0695d716c2c692ba4ae9eb77935e35057177a093ab5ee5b5ca390c2a2713688.scope. Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.052000 audit: BPF prog-id=175 op=LOAD Sep 13 00:56:52.053000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.053000 audit[4238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4197 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363935643731366332633639326261346165396562373739333565 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4197 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363935643731366332633639326261346165396562373739333565 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit: BPF prog-id=176 op=LOAD Sep 13 00:56:52.054000 audit[4238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af190 items=0 ppid=4197 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363935643731366332633639326261346165396562373739333565 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit: BPF prog-id=177 op=LOAD Sep 13 00:56:52.054000 audit[4238]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af1d8 items=0 ppid=4197 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363935643731366332633639326261346165396562373739333565 Sep 13 00:56:52.054000 audit: BPF prog-id=177 op=UNLOAD Sep 13 00:56:52.054000 audit: BPF prog-id=176 op=UNLOAD Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { perfmon } for pid=4238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit[4238]: AVC avc: denied { bpf } for pid=4238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.054000 audit: BPF prog-id=178 op=LOAD Sep 13 00:56:52.054000 audit[4238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001af5e8 items=0 ppid=4197 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363935643731366332633639326261346165396562373739333565 Sep 13 00:56:52.088258 env[1457]: time="2025-09-13T00:56:52.088202406Z" level=info msg="StartContainer for \"a0695d716c2c692ba4ae9eb77935e35057177a093ab5ee5b5ca390c2a2713688\" returns successfully" Sep 13 00:56:52.099000 audit[4253]: AVC avc: denied { getattr } for pid=4253 comm="coredns" path="cgroup:[4026532734]" dev="nsfs" ino=4026532734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c891,c1001 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:56:52.099000 audit[4253]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c52e8 a3=0 items=0 ppid=4197 pid=4253 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c891,c1001 key=(null) Sep 13 00:56:52.099000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:56:52.164736 env[1457]: time="2025-09-13T00:56:52.164690162Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:52.172906 env[1457]: time="2025-09-13T00:56:52.172866672Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:52.178370 env[1457]: time="2025-09-13T00:56:52.178338611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:52.183395 env[1457]: time="2025-09-13T00:56:52.183355556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:52.184087 env[1457]: time="2025-09-13T00:56:52.184051348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 13 00:56:52.188129 env[1457]: time="2025-09-13T00:56:52.188096804Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:56:52.189365 env[1457]: time="2025-09-13T00:56:52.189313390Z" level=info msg="CreateContainer within sandbox \"915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 13 00:56:52.203929 systemd-networkd[1604]: calideeb9cd8e7c: Gained IPv6LL Sep 13 00:56:52.234872 env[1457]: time="2025-09-13T00:56:52.234783488Z" level=info msg="CreateContainer within sandbox \"915cc091e0f8a6a01e1d38c06465ac3ae473cada4a7e1c8ae94adcda2435fede\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"b3ac379b19b802fc0d15ef6ed790f8acdaad90383ca2e7e5b8c716caab744caa\"" Sep 13 00:56:52.237560 env[1457]: time="2025-09-13T00:56:52.237527058Z" level=info msg="StartContainer for \"b3ac379b19b802fc0d15ef6ed790f8acdaad90383ca2e7e5b8c716caab744caa\"" Sep 13 00:56:52.255755 systemd[1]: Started cri-containerd-b3ac379b19b802fc0d15ef6ed790f8acdaad90383ca2e7e5b8c716caab744caa.scope. Sep 13 00:56:52.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.280000 audit: BPF prog-id=179 op=LOAD Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3780 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616333373962313962383032666330643135656636656437393066 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3780 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616333373962313962383032666330643135656636656437393066 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.281000 audit: BPF prog-id=180 op=LOAD Sep 13 00:56:52.281000 audit[4281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000222ec0 items=0 ppid=3780 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616333373962313962383032666330643135656636656437393066 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.282000 audit: BPF prog-id=181 op=LOAD Sep 13 00:56:52.282000 audit[4281]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000222f08 items=0 ppid=3780 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616333373962313962383032666330643135656636656437393066 Sep 13 00:56:52.283000 audit: BPF prog-id=181 op=UNLOAD Sep 13 00:56:52.283000 audit: BPF prog-id=180 op=UNLOAD Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.283000 audit: BPF prog-id=182 op=LOAD Sep 13 00:56:52.283000 audit[4281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000223318 items=0 ppid=3780 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616333373962313962383032666330643135656636656437393066 Sep 13 00:56:52.317992 env[1457]: time="2025-09-13T00:56:52.317652174Z" level=info msg="StopPodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\"" Sep 13 00:56:52.318587 env[1457]: time="2025-09-13T00:56:52.318558264Z" level=info msg="StopPodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\"" Sep 13 00:56:52.329584 env[1457]: time="2025-09-13T00:56:52.329478443Z" level=info msg="StartContainer for \"b3ac379b19b802fc0d15ef6ed790f8acdaad90383ca2e7e5b8c716caab744caa\" returns successfully" Sep 13 00:56:52.427737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2987497925.mount: Deactivated successfully. Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.405 [INFO][4336] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.405 [INFO][4336] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" iface="eth0" netns="/var/run/netns/cni-f502b923-5a6c-78ad-5e1c-87d77f0b9cd6" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.406 [INFO][4336] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" iface="eth0" netns="/var/run/netns/cni-f502b923-5a6c-78ad-5e1c-87d77f0b9cd6" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.406 [INFO][4336] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" iface="eth0" netns="/var/run/netns/cni-f502b923-5a6c-78ad-5e1c-87d77f0b9cd6" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.406 [INFO][4336] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.406 [INFO][4336] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.450 [INFO][4345] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.454 [INFO][4345] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.454 [INFO][4345] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.465 [WARNING][4345] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.465 [INFO][4345] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.467 [INFO][4345] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:52.472046 env[1457]: 2025-09-13 00:56:52.470 [INFO][4336] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:56:52.476379 systemd[1]: run-netns-cni\x2df502b923\x2d5a6c\x2d78ad\x2d5e1c\x2d87d77f0b9cd6.mount: Deactivated successfully. Sep 13 00:56:52.478230 env[1457]: time="2025-09-13T00:56:52.478182002Z" level=info msg="TearDown network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" successfully" Sep 13 00:56:52.478344 env[1457]: time="2025-09-13T00:56:52.478323000Z" level=info msg="StopPodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" returns successfully" Sep 13 00:56:52.479288 env[1457]: time="2025-09-13T00:56:52.479258390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-vmgr4,Uid:dc0f281d-1747-48f1-a1ba-e361ef4367c0,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.417 [INFO][4323] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.418 [INFO][4323] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" iface="eth0" netns="/var/run/netns/cni-c07f4f9b-bb86-5836-768a-acd970b17adc" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.418 [INFO][4323] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" iface="eth0" netns="/var/run/netns/cni-c07f4f9b-bb86-5836-768a-acd970b17adc" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.418 [INFO][4323] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" iface="eth0" netns="/var/run/netns/cni-c07f4f9b-bb86-5836-768a-acd970b17adc" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.418 [INFO][4323] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.418 [INFO][4323] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.498 [INFO][4351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.498 [INFO][4351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.499 [INFO][4351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.509 [WARNING][4351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.510 [INFO][4351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.512 [INFO][4351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:52.518506 env[1457]: 2025-09-13 00:56:52.514 [INFO][4323] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:56:52.522703 systemd[1]: run-netns-cni\x2dc07f4f9b\x2dbb86\x2d5836\x2d768a\x2dacd970b17adc.mount: Deactivated successfully. Sep 13 00:56:52.524424 env[1457]: time="2025-09-13T00:56:52.524381392Z" level=info msg="TearDown network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" successfully" Sep 13 00:56:52.524555 env[1457]: time="2025-09-13T00:56:52.524534090Z" level=info msg="StopPodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" returns successfully" Sep 13 00:56:52.525479 env[1457]: time="2025-09-13T00:56:52.525457080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-cdfz4,Uid:7264b389-b98c-40ac-b232-ce7a430c65aa,Namespace:calico-system,Attempt:1,}" Sep 13 00:56:52.563524 kubelet[2493]: I0913 00:56:52.563450 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-ll9c8" podStartSLOduration=43.563429061 podStartE2EDuration="43.563429061s" podCreationTimestamp="2025-09-13 00:56:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:56:52.530559724 +0000 UTC m=+49.938827888" watchObservedRunningTime="2025-09-13 00:56:52.563429061 +0000 UTC m=+49.971697225" Sep 13 00:56:52.593560 kubelet[2493]: I0913 00:56:52.592711 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-5f665888fd-pvchk" podStartSLOduration=1.56952187 podStartE2EDuration="6.592688638s" podCreationTimestamp="2025-09-13 00:56:46 +0000 UTC" firstStartedPulling="2025-09-13 00:56:47.16272056 +0000 UTC m=+44.570988824" lastFinishedPulling="2025-09-13 00:56:52.185887428 +0000 UTC m=+49.594155592" observedRunningTime="2025-09-13 00:56:52.565002143 +0000 UTC m=+49.973270307" watchObservedRunningTime="2025-09-13 00:56:52.592688638 +0000 UTC m=+50.000956802" Sep 13 00:56:52.574000 audit[4361]: NETFILTER_CFG table=filter:114 family=2 entries=20 op=nft_register_rule pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:52.574000 audit[4361]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdc6567a60 a2=0 a3=7ffdc6567a4c items=0 ppid=2597 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:52.602000 audit[4361]: NETFILTER_CFG table=nat:115 family=2 entries=14 op=nft_register_rule pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:52.602000 audit[4361]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdc6567a60 a2=0 a3=0 items=0 ppid=2597 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:52.663000 audit[4385]: NETFILTER_CFG table=filter:116 family=2 entries=16 op=nft_register_rule pid=4385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:52.663000 audit[4385]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc0c939010 a2=0 a3=7ffc0c938ffc items=0 ppid=2597 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:52.668000 audit[4385]: NETFILTER_CFG table=nat:117 family=2 entries=42 op=nft_register_chain pid=4385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:52.668000 audit[4385]: SYSCALL arch=c000003e syscall=46 success=yes exit=17772 a0=3 a1=7ffc0c939010 a2=0 a3=7ffc0c938ffc items=0 ppid=2597 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:52.778888 systemd-networkd[1604]: calib8d9f904706: Link UP Sep 13 00:56:52.787200 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:56:52.793626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib8d9f904706: link becomes ready Sep 13 00:56:52.793305 systemd-networkd[1604]: calib8d9f904706: Gained carrier Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.656 [INFO][4363] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0 calico-apiserver-756d6c885f- calico-apiserver dc0f281d-1747-48f1-a1ba-e361ef4367c0 939 0 2025-09-13 00:56:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:756d6c885f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 calico-apiserver-756d6c885f-vmgr4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib8d9f904706 [] [] }} ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.656 [INFO][4363] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.718 [INFO][4387] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.718 [INFO][4387] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-0eeb704727", "pod":"calico-apiserver-756d6c885f-vmgr4", "timestamp":"2025-09-13 00:56:52.718654447 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.719 [INFO][4387] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.719 [INFO][4387] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.719 [INFO][4387] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.729 [INFO][4387] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.733 [INFO][4387] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.745 [INFO][4387] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.747 [INFO][4387] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.750 [INFO][4387] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.750 [INFO][4387] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.752 [INFO][4387] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.758 [INFO][4387] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.768 [INFO][4387] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.68/26] block=192.168.113.64/26 handle="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.768 [INFO][4387] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.68/26] handle="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.768 [INFO][4387] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:52.810126 env[1457]: 2025-09-13 00:56:52.768 [INFO][4387] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.68/26] IPv6=[] ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.810959 env[1457]: 2025-09-13 00:56:52.770 [INFO][4363] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"dc0f281d-1747-48f1-a1ba-e361ef4367c0", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"calico-apiserver-756d6c885f-vmgr4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib8d9f904706", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:52.810959 env[1457]: 2025-09-13 00:56:52.770 [INFO][4363] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.68/32] ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.810959 env[1457]: 2025-09-13 00:56:52.770 [INFO][4363] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib8d9f904706 ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.810959 env[1457]: 2025-09-13 00:56:52.794 [INFO][4363] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.810959 env[1457]: 2025-09-13 00:56:52.794 [INFO][4363] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"dc0f281d-1747-48f1-a1ba-e361ef4367c0", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e", Pod:"calico-apiserver-756d6c885f-vmgr4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib8d9f904706", MAC:"ae:e4:13:05:c2:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:52.810959 env[1457]: 2025-09-13 00:56:52.807 [INFO][4363] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-vmgr4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:56:52.839023 env[1457]: time="2025-09-13T00:56:52.838409625Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:52.839023 env[1457]: time="2025-09-13T00:56:52.838470625Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:52.839023 env[1457]: time="2025-09-13T00:56:52.838486725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:52.839023 env[1457]: time="2025-09-13T00:56:52.838655523Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e pid=4418 runtime=io.containerd.runc.v2 Sep 13 00:56:52.846000 audit[4427]: NETFILTER_CFG table=filter:118 family=2 entries=58 op=nft_register_chain pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:52.846000 audit[4427]: SYSCALL arch=c000003e syscall=46 success=yes exit=30584 a0=3 a1=7ffc895d6a10 a2=0 a3=7ffc895d69fc items=0 ppid=3830 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.846000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:52.869066 systemd[1]: Started cri-containerd-ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e.scope. Sep 13 00:56:52.878200 systemd-networkd[1604]: cali1af7c2d5c31: Link UP Sep 13 00:56:52.886546 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1af7c2d5c31: link becomes ready Sep 13 00:56:52.886710 systemd-networkd[1604]: cali1af7c2d5c31: Gained carrier Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.687 [INFO][4371] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0 goldmane-54d579b49d- calico-system 7264b389-b98c-40ac-b232-ce7a430c65aa 940 0 2025-09-13 00:56:24 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:54d579b49d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 goldmane-54d579b49d-cdfz4 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali1af7c2d5c31 [] [] }} ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.687 [INFO][4371] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.754 [INFO][4394] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" HandleID="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.754 [INFO][4394] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" HandleID="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-0eeb704727", "pod":"goldmane-54d579b49d-cdfz4", "timestamp":"2025-09-13 00:56:52.754424252 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.754 [INFO][4394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.770 [INFO][4394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.770 [INFO][4394] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.829 [INFO][4394] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.838 [INFO][4394] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.848 [INFO][4394] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.850 [INFO][4394] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.853 [INFO][4394] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.853 [INFO][4394] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.854 [INFO][4394] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.860 [INFO][4394] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.870 [INFO][4394] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.69/26] block=192.168.113.64/26 handle="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.870 [INFO][4394] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.69/26] handle="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.870 [INFO][4394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:52.909620 env[1457]: 2025-09-13 00:56:52.870 [INFO][4394] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.69/26] IPv6=[] ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" HandleID="k8s-pod-network.44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.910228 env[1457]: 2025-09-13 00:56:52.875 [INFO][4371] cni-plugin/k8s.go 418: Populated endpoint ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7264b389-b98c-40ac-b232-ce7a430c65aa", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"goldmane-54d579b49d-cdfz4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1af7c2d5c31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:52.910228 env[1457]: 2025-09-13 00:56:52.875 [INFO][4371] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.69/32] ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.910228 env[1457]: 2025-09-13 00:56:52.875 [INFO][4371] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1af7c2d5c31 ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.910228 env[1457]: 2025-09-13 00:56:52.892 [INFO][4371] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.910228 env[1457]: 2025-09-13 00:56:52.893 [INFO][4371] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7264b389-b98c-40ac-b232-ce7a430c65aa", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d", Pod:"goldmane-54d579b49d-cdfz4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1af7c2d5c31", MAC:"8e:9a:fa:77:75:9a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:52.910228 env[1457]: 2025-09-13 00:56:52.907 [INFO][4371] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d" Namespace="calico-system" Pod="goldmane-54d579b49d-cdfz4" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit: BPF prog-id=183 op=LOAD Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4418 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464623334363031653733306532343431383065646631356337306237 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4418 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464623334363031653733306532343431383065646631356337306237 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.919000 audit: BPF prog-id=184 op=LOAD Sep 13 00:56:52.919000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00028a420 items=0 ppid=4418 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464623334363031653733306532343431383065646631356337306237 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit: BPF prog-id=185 op=LOAD Sep 13 00:56:52.920000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00028a468 items=0 ppid=4418 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464623334363031653733306532343431383065646631356337306237 Sep 13 00:56:52.920000 audit: BPF prog-id=185 op=UNLOAD Sep 13 00:56:52.920000 audit: BPF prog-id=184 op=UNLOAD Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.920000 audit: BPF prog-id=186 op=LOAD Sep 13 00:56:52.920000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00028a878 items=0 ppid=4418 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464623334363031653733306532343431383065646631356337306237 Sep 13 00:56:52.932000 audit[4463]: NETFILTER_CFG table=filter:119 family=2 entries=62 op=nft_register_chain pid=4463 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:52.932000 audit[4463]: SYSCALL arch=c000003e syscall=46 success=yes exit=31596 a0=3 a1=7fff5fd1c5c0 a2=0 a3=7fff5fd1c5ac items=0 ppid=3830 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.932000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:52.936796 env[1457]: time="2025-09-13T00:56:52.936729140Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:52.936920 env[1457]: time="2025-09-13T00:56:52.936774640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:52.936920 env[1457]: time="2025-09-13T00:56:52.936790039Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:52.937041 env[1457]: time="2025-09-13T00:56:52.936918738Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d pid=4462 runtime=io.containerd.runc.v2 Sep 13 00:56:52.952181 systemd[1]: Started cri-containerd-44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d.scope. Sep 13 00:56:52.974988 env[1457]: time="2025-09-13T00:56:52.974951818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-vmgr4,Uid:dc0f281d-1747-48f1-a1ba-e361ef4367c0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\"" Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.974000 audit: BPF prog-id=187 op=LOAD Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4462 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434636131396237613362616231386564323361326165626238303332 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4462 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434636131396237613362616231386564323361326165626238303332 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.976000 audit: BPF prog-id=188 op=LOAD Sep 13 00:56:52.976000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ccd90 items=0 ppid=4462 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434636131396237613362616231386564323361326165626238303332 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit: BPF prog-id=189 op=LOAD Sep 13 00:56:52.979000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ccdd8 items=0 ppid=4462 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434636131396237613362616231386564323361326165626238303332 Sep 13 00:56:52.979000 audit: BPF prog-id=189 op=UNLOAD Sep 13 00:56:52.979000 audit: BPF prog-id=188 op=UNLOAD Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:52.979000 audit: BPF prog-id=190 op=LOAD Sep 13 00:56:52.979000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cd1e8 items=0 ppid=4462 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:52.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434636131396237613362616231386564323361326165626238303332 Sep 13 00:56:53.010044 env[1457]: time="2025-09-13T00:56:53.010012232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-cdfz4,Uid:7264b389-b98c-40ac-b232-ce7a430c65aa,Namespace:calico-system,Attempt:1,} returns sandbox id \"44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d\"" Sep 13 00:56:53.163692 systemd-networkd[1604]: calif464d21f1a7: Gained IPv6LL Sep 13 00:56:53.317557 env[1457]: time="2025-09-13T00:56:53.316472379Z" level=info msg="StopPodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\"" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.415 [INFO][4521] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.415 [INFO][4521] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" iface="eth0" netns="/var/run/netns/cni-efe2e909-9c34-e82f-65ac-5c26b31bc2f3" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.416 [INFO][4521] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" iface="eth0" netns="/var/run/netns/cni-efe2e909-9c34-e82f-65ac-5c26b31bc2f3" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.416 [INFO][4521] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" iface="eth0" netns="/var/run/netns/cni-efe2e909-9c34-e82f-65ac-5c26b31bc2f3" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.416 [INFO][4521] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.416 [INFO][4521] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.474 [INFO][4528] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.474 [INFO][4528] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.476 [INFO][4528] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.483 [WARNING][4528] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.483 [INFO][4528] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.484 [INFO][4528] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:53.488895 env[1457]: 2025-09-13 00:56:53.486 [INFO][4521] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:56:53.493582 systemd[1]: run-netns-cni\x2defe2e909\x2d9c34\x2de82f\x2d65ac\x2d5c26b31bc2f3.mount: Deactivated successfully. Sep 13 00:56:53.495487 env[1457]: time="2025-09-13T00:56:53.495449121Z" level=info msg="TearDown network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" successfully" Sep 13 00:56:53.495643 env[1457]: time="2025-09-13T00:56:53.495621619Z" level=info msg="StopPodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" returns successfully" Sep 13 00:56:53.513726 env[1457]: time="2025-09-13T00:56:53.513672821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-gm4lp,Uid:f64e1518-9dc7-4135-aa11-2d5bffea4ae3,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:56:53.688287 systemd-networkd[1604]: caliac6f797160d: Link UP Sep 13 00:56:53.695579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac6f797160d: link becomes ready Sep 13 00:56:53.696354 systemd-networkd[1604]: caliac6f797160d: Gained carrier Sep 13 00:56:53.696782 env[1457]: time="2025-09-13T00:56:53.696744218Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:53.705185 env[1457]: time="2025-09-13T00:56:53.705160826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:53.708826 env[1457]: time="2025-09-13T00:56:53.708795886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.602 [INFO][4534] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0 calico-apiserver-756d6c885f- calico-apiserver f64e1518-9dc7-4135-aa11-2d5bffea4ae3 964 0 2025-09-13 00:56:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:756d6c885f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 calico-apiserver-756d6c885f-gm4lp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliac6f797160d [] [] }} ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.602 [INFO][4534] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.638 [INFO][4546] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.638 [INFO][4546] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b74a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-0eeb704727", "pod":"calico-apiserver-756d6c885f-gm4lp", "timestamp":"2025-09-13 00:56:53.638565455 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.638 [INFO][4546] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.638 [INFO][4546] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.639 [INFO][4546] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.645 [INFO][4546] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.649 [INFO][4546] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.655 [INFO][4546] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.657 [INFO][4546] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.659 [INFO][4546] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.660 [INFO][4546] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.661 [INFO][4546] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7 Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.666 [INFO][4546] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.680 [INFO][4546] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.70/26] block=192.168.113.64/26 handle="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.680 [INFO][4546] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.70/26] handle="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.680 [INFO][4546] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:53.715398 env[1457]: 2025-09-13 00:56:53.680 [INFO][4546] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.70/26] IPv6=[] ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.716208 env[1457]: 2025-09-13 00:56:53.681 [INFO][4534] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f64e1518-9dc7-4135-aa11-2d5bffea4ae3", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"calico-apiserver-756d6c885f-gm4lp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac6f797160d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:53.716208 env[1457]: 2025-09-13 00:56:53.681 [INFO][4534] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.70/32] ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.716208 env[1457]: 2025-09-13 00:56:53.681 [INFO][4534] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliac6f797160d ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.716208 env[1457]: 2025-09-13 00:56:53.698 [INFO][4534] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.716208 env[1457]: 2025-09-13 00:56:53.699 [INFO][4534] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f64e1518-9dc7-4135-aa11-2d5bffea4ae3", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7", Pod:"calico-apiserver-756d6c885f-gm4lp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac6f797160d", MAC:"12:38:f8:1d:71:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:53.716208 env[1457]: 2025-09-13 00:56:53.711 [INFO][4534] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Namespace="calico-apiserver" Pod="calico-apiserver-756d6c885f-gm4lp" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:56:53.717539 env[1457]: time="2025-09-13T00:56:53.717490891Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:53.718446 env[1457]: time="2025-09-13T00:56:53.717950186Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:56:53.720664 env[1457]: time="2025-09-13T00:56:53.720625657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:56:53.721871 env[1457]: time="2025-09-13T00:56:53.721839844Z" level=info msg="CreateContainer within sandbox \"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:56:53.735000 audit[4563]: NETFILTER_CFG table=filter:120 family=2 entries=49 op=nft_register_chain pid=4563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:53.735000 audit[4563]: SYSCALL arch=c000003e syscall=46 success=yes exit=25436 a0=3 a1=7fffe3f46d60 a2=0 a3=7fffe3f46d4c items=0 ppid=3830 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.735000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:53.748556 env[1457]: time="2025-09-13T00:56:53.748436353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:53.748661 env[1457]: time="2025-09-13T00:56:53.748472852Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:53.748661 env[1457]: time="2025-09-13T00:56:53.748504152Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:53.750794 env[1457]: time="2025-09-13T00:56:53.750744927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7 pid=4572 runtime=io.containerd.runc.v2 Sep 13 00:56:53.772191 systemd[1]: Started cri-containerd-5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7.scope. Sep 13 00:56:53.779816 env[1457]: time="2025-09-13T00:56:53.779766810Z" level=info msg="CreateContainer within sandbox \"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"63dacada06d9b690ac82cafee002c9c6e453a2f193a6c5613c0b85320305aa5a\"" Sep 13 00:56:53.781999 env[1457]: time="2025-09-13T00:56:53.781842687Z" level=info msg="StartContainer for \"63dacada06d9b690ac82cafee002c9c6e453a2f193a6c5613c0b85320305aa5a\"" Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.787000 audit: BPF prog-id=191 op=LOAD Sep 13 00:56:53.788000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.788000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4572 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566306561366333346633633038643136666261643362373863393734 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4572 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566306561366333346633633038643136666261643362373863393734 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit: BPF prog-id=192 op=LOAD Sep 13 00:56:53.789000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024e00 items=0 ppid=4572 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566306561366333346633633038643136666261643362373863393734 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit: BPF prog-id=193 op=LOAD Sep 13 00:56:53.789000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024e48 items=0 ppid=4572 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566306561366333346633633038643136666261643362373863393734 Sep 13 00:56:53.789000 audit: BPF prog-id=193 op=UNLOAD Sep 13 00:56:53.789000 audit: BPF prog-id=192 op=UNLOAD Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.789000 audit: BPF prog-id=194 op=LOAD Sep 13 00:56:53.789000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025258 items=0 ppid=4572 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566306561366333346633633038643136666261643362373863393734 Sep 13 00:56:53.808153 systemd[1]: Started cri-containerd-63dacada06d9b690ac82cafee002c9c6e453a2f193a6c5613c0b85320305aa5a.scope. Sep 13 00:56:53.837918 env[1457]: time="2025-09-13T00:56:53.837874974Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-756d6c885f-gm4lp,Uid:f64e1518-9dc7-4135-aa11-2d5bffea4ae3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\"" Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f78600f5908 items=0 ppid=4104 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633646163616461303664396236393061633832636166656530303263 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.840000 audit: BPF prog-id=195 op=LOAD Sep 13 00:56:53.840000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0000b08c8 items=0 ppid=4104 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633646163616461303664396236393061633832636166656530303263 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.841000 audit: BPF prog-id=196 op=LOAD Sep 13 00:56:53.841000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0000b0918 items=0 ppid=4104 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633646163616461303664396236393061633832636166656530303263 Sep 13 00:56:53.841000 audit: BPF prog-id=196 op=UNLOAD Sep 13 00:56:53.841000 audit: BPF prog-id=195 op=UNLOAD Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:53.842000 audit: BPF prog-id=197 op=LOAD Sep 13 00:56:53.842000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0000b09a8 items=0 ppid=4104 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:53.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633646163616461303664396236393061633832636166656530303263 Sep 13 00:56:53.862319 env[1457]: time="2025-09-13T00:56:53.862287807Z" level=info msg="StartContainer for \"63dacada06d9b690ac82cafee002c9c6e453a2f193a6c5613c0b85320305aa5a\" returns successfully" Sep 13 00:56:54.313818 env[1457]: time="2025-09-13T00:56:54.313774597Z" level=info msg="StopPodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\"" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.365 [INFO][4649] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.366 [INFO][4649] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" iface="eth0" netns="/var/run/netns/cni-74259a99-9675-06f3-be30-0541f39ec105" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.366 [INFO][4649] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" iface="eth0" netns="/var/run/netns/cni-74259a99-9675-06f3-be30-0541f39ec105" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.366 [INFO][4649] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" iface="eth0" netns="/var/run/netns/cni-74259a99-9675-06f3-be30-0541f39ec105" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.366 [INFO][4649] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.366 [INFO][4649] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.387 [INFO][4656] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.387 [INFO][4656] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.387 [INFO][4656] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.392 [WARNING][4656] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.392 [INFO][4656] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.393 [INFO][4656] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:54.395631 env[1457]: 2025-09-13 00:56:54.394 [INFO][4649] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:56:54.396126 env[1457]: time="2025-09-13T00:56:54.395826307Z" level=info msg="TearDown network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" successfully" Sep 13 00:56:54.396126 env[1457]: time="2025-09-13T00:56:54.395867406Z" level=info msg="StopPodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" returns successfully" Sep 13 00:56:54.396749 env[1457]: time="2025-09-13T00:56:54.396725697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687cd554b6-dlwkd,Uid:502d5c2b-eda9-42cc-894a-209da2a4fe8a,Namespace:calico-system,Attempt:1,}" Sep 13 00:56:54.425808 systemd[1]: run-netns-cni\x2d74259a99\x2d9675\x2d06f3\x2dbe30\x2d0541f39ec105.mount: Deactivated successfully. Sep 13 00:56:54.443681 systemd-networkd[1604]: cali1af7c2d5c31: Gained IPv6LL Sep 13 00:56:54.508774 systemd-networkd[1604]: calib8d9f904706: Gained IPv6LL Sep 13 00:56:54.550726 systemd-networkd[1604]: cali2a59258dc81: Link UP Sep 13 00:56:54.556586 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:56:54.562589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a59258dc81: link becomes ready Sep 13 00:56:54.563142 systemd-networkd[1604]: cali2a59258dc81: Gained carrier Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.477 [INFO][4663] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0 calico-kube-controllers-687cd554b6- calico-system 502d5c2b-eda9-42cc-894a-209da2a4fe8a 977 0 2025-09-13 00:56:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:687cd554b6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 calico-kube-controllers-687cd554b6-dlwkd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali2a59258dc81 [] [] }} ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.477 [INFO][4663] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.505 [INFO][4675] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" HandleID="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.505 [INFO][4675] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" HandleID="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000250ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-0eeb704727", "pod":"calico-kube-controllers-687cd554b6-dlwkd", "timestamp":"2025-09-13 00:56:54.505319119 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.505 [INFO][4675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.505 [INFO][4675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.505 [INFO][4675] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.512 [INFO][4675] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.515 [INFO][4675] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.519 [INFO][4675] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.520 [INFO][4675] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.522 [INFO][4675] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.522 [INFO][4675] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.523 [INFO][4675] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7 Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.527 [INFO][4675] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.539 [INFO][4675] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.71/26] block=192.168.113.64/26 handle="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.539 [INFO][4675] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.71/26] handle="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.540 [INFO][4675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:54.579841 env[1457]: 2025-09-13 00:56:54.540 [INFO][4675] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.71/26] IPv6=[] ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" HandleID="k8s-pod-network.90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.580945 env[1457]: 2025-09-13 00:56:54.541 [INFO][4663] cni-plugin/k8s.go 418: Populated endpoint ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0", GenerateName:"calico-kube-controllers-687cd554b6-", Namespace:"calico-system", SelfLink:"", UID:"502d5c2b-eda9-42cc-894a-209da2a4fe8a", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687cd554b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"calico-kube-controllers-687cd554b6-dlwkd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2a59258dc81", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:54.580945 env[1457]: 2025-09-13 00:56:54.541 [INFO][4663] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.71/32] ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.580945 env[1457]: 2025-09-13 00:56:54.541 [INFO][4663] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2a59258dc81 ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.580945 env[1457]: 2025-09-13 00:56:54.563 [INFO][4663] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.580945 env[1457]: 2025-09-13 00:56:54.563 [INFO][4663] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0", GenerateName:"calico-kube-controllers-687cd554b6-", Namespace:"calico-system", SelfLink:"", UID:"502d5c2b-eda9-42cc-894a-209da2a4fe8a", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687cd554b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7", Pod:"calico-kube-controllers-687cd554b6-dlwkd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2a59258dc81", MAC:"36:95:8d:bb:3a:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:54.580945 env[1457]: 2025-09-13 00:56:54.576 [INFO][4663] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7" Namespace="calico-system" Pod="calico-kube-controllers-687cd554b6-dlwkd" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:56:54.593000 audit[4690]: NETFILTER_CFG table=filter:121 family=2 entries=52 op=nft_register_chain pid=4690 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:54.593000 audit[4690]: SYSCALL arch=c000003e syscall=46 success=yes exit=24312 a0=3 a1=7fff42d3cad0 a2=0 a3=7fff42d3cabc items=0 ppid=3830 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:54.593000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:54.605769 env[1457]: time="2025-09-13T00:56:54.605686730Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:54.605769 env[1457]: time="2025-09-13T00:56:54.605731830Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:54.605968 env[1457]: time="2025-09-13T00:56:54.605936427Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:54.606353 env[1457]: time="2025-09-13T00:56:54.606316623Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7 pid=4698 runtime=io.containerd.runc.v2 Sep 13 00:56:54.630448 systemd[1]: Started cri-containerd-90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7.scope. Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit: BPF prog-id=198 op=LOAD Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4698 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:54.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653935353361326339306665353531633563376236656136313333 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4698 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:54.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653935353361326339306665353531633563376236656136313333 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit: BPF prog-id=199 op=LOAD Sep 13 00:56:54.644000 audit[4708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286830 items=0 ppid=4698 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:54.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653935353361326339306665353531633563376236656136313333 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit: BPF prog-id=200 op=LOAD Sep 13 00:56:54.644000 audit[4708]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286878 items=0 ppid=4698 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:54.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653935353361326339306665353531633563376236656136313333 Sep 13 00:56:54.644000 audit: BPF prog-id=200 op=UNLOAD Sep 13 00:56:54.644000 audit: BPF prog-id=199 op=UNLOAD Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:54.644000 audit: BPF prog-id=201 op=LOAD Sep 13 00:56:54.644000 audit[4708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000286c88 items=0 ppid=4698 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:54.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653935353361326339306665353531633563376236656136313333 Sep 13 00:56:54.679550 env[1457]: time="2025-09-13T00:56:54.679466930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-687cd554b6-dlwkd,Uid:502d5c2b-eda9-42cc-894a-209da2a4fe8a,Namespace:calico-system,Attempt:1,} returns sandbox id \"90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7\"" Sep 13 00:56:55.148093 systemd-networkd[1604]: caliac6f797160d: Gained IPv6LL Sep 13 00:56:55.318649 env[1457]: time="2025-09-13T00:56:55.318606326Z" level=info msg="StopPodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\"" Sep 13 00:56:55.319239 env[1457]: time="2025-09-13T00:56:55.319211019Z" level=info msg="StopPodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\"" Sep 13 00:56:55.426293 systemd[1]: run-containerd-runc-k8s.io-90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7-runc.bflrYa.mount: Deactivated successfully. Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.393 [INFO][4746] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.393 [INFO][4746] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" iface="eth0" netns="/var/run/netns/cni-a75eebde-16ac-caf8-36fb-d563812b1d2d" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.393 [INFO][4746] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" iface="eth0" netns="/var/run/netns/cni-a75eebde-16ac-caf8-36fb-d563812b1d2d" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.394 [INFO][4746] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" iface="eth0" netns="/var/run/netns/cni-a75eebde-16ac-caf8-36fb-d563812b1d2d" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.394 [INFO][4746] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.394 [INFO][4746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.452 [INFO][4763] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.452 [INFO][4763] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.452 [INFO][4763] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.459 [WARNING][4763] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.459 [INFO][4763] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.462 [INFO][4763] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:55.466569 env[1457]: 2025-09-13 00:56:55.463 [INFO][4746] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:56:55.471004 systemd[1]: run-netns-cni\x2da75eebde\x2d16ac\x2dcaf8\x2d36fb\x2dd563812b1d2d.mount: Deactivated successfully. Sep 13 00:56:55.471433 env[1457]: time="2025-09-13T00:56:55.471392483Z" level=info msg="TearDown network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" successfully" Sep 13 00:56:55.471658 env[1457]: time="2025-09-13T00:56:55.471635980Z" level=info msg="StopPodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" returns successfully" Sep 13 00:56:55.472774 env[1457]: time="2025-09-13T00:56:55.472728568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fdb94b7b4-b7x7p,Uid:3ee92753-0503-4301-9dd8-260e451cee11,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.431 [INFO][4756] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.431 [INFO][4756] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" iface="eth0" netns="/var/run/netns/cni-283cb2c7-48d6-5d77-503c-da8135f4b684" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.431 [INFO][4756] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" iface="eth0" netns="/var/run/netns/cni-283cb2c7-48d6-5d77-503c-da8135f4b684" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.431 [INFO][4756] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" iface="eth0" netns="/var/run/netns/cni-283cb2c7-48d6-5d77-503c-da8135f4b684" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.431 [INFO][4756] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.431 [INFO][4756] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.538 [INFO][4770] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.549 [INFO][4770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.549 [INFO][4770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.558 [WARNING][4770] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.558 [INFO][4770] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.560 [INFO][4770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:55.566679 env[1457]: 2025-09-13 00:56:55.563 [INFO][4756] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:56:55.567773 env[1457]: time="2025-09-13T00:56:55.567728846Z" level=info msg="TearDown network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" successfully" Sep 13 00:56:55.567916 env[1457]: time="2025-09-13T00:56:55.567893545Z" level=info msg="StopPodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" returns successfully" Sep 13 00:56:55.569053 env[1457]: time="2025-09-13T00:56:55.569018333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-p4jmt,Uid:36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d,Namespace:kube-system,Attempt:1,}" Sep 13 00:56:55.575373 systemd[1]: run-netns-cni\x2d283cb2c7\x2d48d6\x2d5d77\x2d503c\x2dda8135f4b684.mount: Deactivated successfully. Sep 13 00:56:55.775705 systemd-networkd[1604]: cali520e4fb3ccd: Link UP Sep 13 00:56:55.780901 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:56:55.780998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali520e4fb3ccd: link becomes ready Sep 13 00:56:55.784857 systemd-networkd[1604]: cali520e4fb3ccd: Gained carrier Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.635 [INFO][4777] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0 calico-apiserver-7fdb94b7b4- calico-apiserver 3ee92753-0503-4301-9dd8-260e451cee11 985 0 2025-09-13 00:56:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fdb94b7b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 calico-apiserver-7fdb94b7b4-b7x7p eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali520e4fb3ccd [] [] }} ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.636 [INFO][4777] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.714 [INFO][4800] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" HandleID="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.714 [INFO][4800] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" HandleID="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd670), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-0eeb704727", "pod":"calico-apiserver-7fdb94b7b4-b7x7p", "timestamp":"2025-09-13 00:56:55.713973573 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.714 [INFO][4800] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.714 [INFO][4800] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.714 [INFO][4800] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.722 [INFO][4800] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.731 [INFO][4800] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.739 [INFO][4800] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.741 [INFO][4800] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.743 [INFO][4800] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.743 [INFO][4800] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.745 [INFO][4800] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264 Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.752 [INFO][4800] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.762 [INFO][4800] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.72/26] block=192.168.113.64/26 handle="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.762 [INFO][4800] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.72/26] handle="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.762 [INFO][4800] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:55.803096 env[1457]: 2025-09-13 00:56:55.762 [INFO][4800] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.72/26] IPv6=[] ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" HandleID="k8s-pod-network.1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.804180 env[1457]: 2025-09-13 00:56:55.764 [INFO][4777] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0", GenerateName:"calico-apiserver-7fdb94b7b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"3ee92753-0503-4301-9dd8-260e451cee11", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fdb94b7b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"calico-apiserver-7fdb94b7b4-b7x7p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali520e4fb3ccd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:55.804180 env[1457]: 2025-09-13 00:56:55.766 [INFO][4777] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.72/32] ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.804180 env[1457]: 2025-09-13 00:56:55.767 [INFO][4777] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali520e4fb3ccd ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.804180 env[1457]: 2025-09-13 00:56:55.784 [INFO][4777] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.804180 env[1457]: 2025-09-13 00:56:55.785 [INFO][4777] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0", GenerateName:"calico-apiserver-7fdb94b7b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"3ee92753-0503-4301-9dd8-260e451cee11", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fdb94b7b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264", Pod:"calico-apiserver-7fdb94b7b4-b7x7p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali520e4fb3ccd", MAC:"e6:c6:8c:9f:2d:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:55.804180 env[1457]: 2025-09-13 00:56:55.801 [INFO][4777] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-b7x7p" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:56:55.815000 audit[4826]: NETFILTER_CFG table=filter:122 family=2 entries=57 op=nft_register_chain pid=4826 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:55.815000 audit[4826]: SYSCALL arch=c000003e syscall=46 success=yes exit=27812 a0=3 a1=7ffc8a875b40 a2=0 a3=7ffc8a875b2c items=0 ppid=3830 pid=4826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:55.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:55.859902 systemd-networkd[1604]: cali50bbfa3d844: Link UP Sep 13 00:56:55.868552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali50bbfa3d844: link becomes ready Sep 13 00:56:55.868041 systemd-networkd[1604]: cali50bbfa3d844: Gained carrier Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.696 [INFO][4791] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0 coredns-668d6bf9bc- kube-system 36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d 986 0 2025-09-13 00:56:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 coredns-668d6bf9bc-p4jmt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali50bbfa3d844 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.696 [INFO][4791] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.760 [INFO][4809] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" HandleID="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.760 [INFO][4809] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" HandleID="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025afe0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.8-n-0eeb704727", "pod":"coredns-668d6bf9bc-p4jmt", "timestamp":"2025-09-13 00:56:55.760395374 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.761 [INFO][4809] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.763 [INFO][4809] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.763 [INFO][4809] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.824 [INFO][4809] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.831 [INFO][4809] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.836 [INFO][4809] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.837 [INFO][4809] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.839 [INFO][4809] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.839 [INFO][4809] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.840 [INFO][4809] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.846 [INFO][4809] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.854 [INFO][4809] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.73/26] block=192.168.113.64/26 handle="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.854 [INFO][4809] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.73/26] handle="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.854 [INFO][4809] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:55.885448 env[1457]: 2025-09-13 00:56:55.854 [INFO][4809] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.73/26] IPv6=[] ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" HandleID="k8s-pod-network.9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.886290 env[1457]: 2025-09-13 00:56:55.856 [INFO][4791] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"coredns-668d6bf9bc-p4jmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.73/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50bbfa3d844", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:55.886290 env[1457]: 2025-09-13 00:56:55.856 [INFO][4791] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.73/32] ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.886290 env[1457]: 2025-09-13 00:56:55.856 [INFO][4791] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali50bbfa3d844 ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.886290 env[1457]: 2025-09-13 00:56:55.868 [INFO][4791] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.886290 env[1457]: 2025-09-13 00:56:55.869 [INFO][4791] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e", Pod:"coredns-668d6bf9bc-p4jmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.73/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50bbfa3d844", MAC:"b6:15:6e:72:49:36", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:55.886290 env[1457]: 2025-09-13 00:56:55.883 [INFO][4791] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e" Namespace="kube-system" Pod="coredns-668d6bf9bc-p4jmt" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:56:55.900000 audit[4836]: NETFILTER_CFG table=filter:123 family=2 entries=62 op=nft_register_chain pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:55.900000 audit[4836]: SYSCALL arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffff8c408b0 a2=0 a3=7ffff8c4089c items=0 ppid=3830 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:55.900000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:55.979662 systemd-networkd[1604]: cali2a59258dc81: Gained IPv6LL Sep 13 00:56:56.123640 env[1457]: time="2025-09-13T00:56:56.120684309Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:56.123916 env[1457]: time="2025-09-13T00:56:56.120730608Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:56.123916 env[1457]: time="2025-09-13T00:56:56.120745908Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:56.123916 env[1457]: time="2025-09-13T00:56:56.123834675Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264 pid=4846 runtime=io.containerd.runc.v2 Sep 13 00:56:56.139996 env[1457]: time="2025-09-13T00:56:56.139796205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:56.139996 env[1457]: time="2025-09-13T00:56:56.139839604Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:56.139996 env[1457]: time="2025-09-13T00:56:56.139855604Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:56.140194 env[1457]: time="2025-09-13T00:56:56.140020002Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e pid=4874 runtime=io.containerd.runc.v2 Sep 13 00:56:56.146642 systemd[1]: Started cri-containerd-1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264.scope. Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.175033 kernel: kauditd_printk_skb: 528 callbacks suppressed Sep 13 00:56:56.175115 kernel: audit: type=1400 audit(1757725016.168:1297): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.195789 systemd[1]: Started cri-containerd-9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e.scope. Sep 13 00:56:56.201881 kernel: audit: type=1400 audit(1757725016.168:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.207004 kernel: audit: type=1400 audit(1757725016.168:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.244381 kernel: audit: type=1400 audit(1757725016.168:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.244472 kernel: audit: type=1400 audit(1757725016.168:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.268185 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:56:56.268259 kernel: audit: audit_lost=54 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:56:56.268284 kernel: audit: type=1400 audit(1757725016.168:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.268312 kernel: audit: backlog limit exceeded Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.168000 audit: BPF prog-id=202 op=LOAD Sep 13 00:56:56.288522 kernel: audit: type=1400 audit(1757725016.168:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4846 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162363834326465626566396265373162373032613338626165333663 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=4846 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162363834326465626566396265373162373032613338626165333663 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.169000 audit: BPF prog-id=203 op=LOAD Sep 13 00:56:56.169000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000382900 items=0 ppid=4846 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162363834326465626566396265373162373032613338626165333663 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit: BPF prog-id=204 op=LOAD Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4874 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933393764656333343534643065393936386232613238643732386466 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4874 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933393764656333343534643065393936386232613238643732386466 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.243000 audit: BPF prog-id=205 op=LOAD Sep 13 00:56:56.227000 audit: BPF prog-id=206 op=LOAD Sep 13 00:56:56.243000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000286470 items=0 ppid=4874 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933393764656333343534643065393936386232613238643732386466 Sep 13 00:56:56.287000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.227000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000382948 items=0 ppid=4846 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162363834326465626566396265373162373032613338626165333663 Sep 13 00:56:56.287000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002864b8 items=0 ppid=4874 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933393764656333343534643065393936386232613238643732386466 Sep 13 00:56:56.290000 audit: BPF prog-id=207 op=UNLOAD Sep 13 00:56:56.290000 audit: BPF prog-id=205 op=UNLOAD Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.290000 audit: BPF prog-id=208 op=LOAD Sep 13 00:56:56.290000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002868c8 items=0 ppid=4874 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933393764656333343534643065393936386232613238643732386466 Sep 13 00:56:56.290000 audit: BPF prog-id=206 op=UNLOAD Sep 13 00:56:56.290000 audit: BPF prog-id=203 op=UNLOAD Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { perfmon } for pid=4861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit[4861]: AVC avc: denied { bpf } for pid=4861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.291000 audit: BPF prog-id=209 op=LOAD Sep 13 00:56:56.291000 audit[4861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000382d58 items=0 ppid=4846 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162363834326465626566396265373162373032613338626165333663 Sep 13 00:56:56.390653 env[1457]: time="2025-09-13T00:56:56.386320075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-p4jmt,Uid:36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d,Namespace:kube-system,Attempt:1,} returns sandbox id \"9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e\"" Sep 13 00:56:56.392312 env[1457]: time="2025-09-13T00:56:56.392276711Z" level=info msg="CreateContainer within sandbox \"9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:56:56.415946 env[1457]: time="2025-09-13T00:56:56.415901259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fdb94b7b4-b7x7p,Uid:3ee92753-0503-4301-9dd8-260e451cee11,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264\"" Sep 13 00:56:56.453898 env[1457]: time="2025-09-13T00:56:56.453832755Z" level=info msg="CreateContainer within sandbox \"9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c17392cb9171ff973ad0d22bb85400061d162b455cc7a3e33553bc225c898fce\"" Sep 13 00:56:56.455869 env[1457]: time="2025-09-13T00:56:56.455835033Z" level=info msg="StartContainer for \"c17392cb9171ff973ad0d22bb85400061d162b455cc7a3e33553bc225c898fce\"" Sep 13 00:56:56.524741 systemd[1]: Started cri-containerd-c17392cb9171ff973ad0d22bb85400061d162b455cc7a3e33553bc225c898fce.scope. Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.638000 audit: BPF prog-id=210 op=LOAD Sep 13 00:56:56.640000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.640000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4874 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331373339326362393137316666393733616430643232626238353430 Sep 13 00:56:56.640000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.640000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4874 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331373339326362393137316666393733616430643232626238353430 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.641000 audit: BPF prog-id=211 op=LOAD Sep 13 00:56:56.641000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f1e80 items=0 ppid=4874 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331373339326362393137316666393733616430643232626238353430 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.643000 audit: BPF prog-id=212 op=LOAD Sep 13 00:56:56.643000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f1ec8 items=0 ppid=4874 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331373339326362393137316666393733616430643232626238353430 Sep 13 00:56:56.644000 audit: BPF prog-id=212 op=UNLOAD Sep 13 00:56:56.644000 audit: BPF prog-id=211 op=UNLOAD Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:56.644000 audit: BPF prog-id=213 op=LOAD Sep 13 00:56:56.644000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ba2d8 items=0 ppid=4874 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:56.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331373339326362393137316666393733616430643232626238353430 Sep 13 00:56:56.691448 env[1457]: time="2025-09-13T00:56:56.691383521Z" level=info msg="StartContainer for \"c17392cb9171ff973ad0d22bb85400061d162b455cc7a3e33553bc225c898fce\" returns successfully" Sep 13 00:56:56.703000 audit[4939]: AVC avc: denied { getattr } for pid=4939 comm="coredns" path="cgroup:[4026532778]" dev="nsfs" ino=4026532778 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c311 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:56:56.703000 audit[4939]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014a900 a2=c000497898 a3=0 items=0 ppid=4874 pid=4939 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c311 key=(null) Sep 13 00:56:56.703000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:56:57.003645 systemd-networkd[1604]: cali520e4fb3ccd: Gained IPv6LL Sep 13 00:56:57.003968 systemd-networkd[1604]: cali50bbfa3d844: Gained IPv6LL Sep 13 00:56:57.631566 kubelet[2493]: I0913 00:56:57.631491 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-p4jmt" podStartSLOduration=48.631460146 podStartE2EDuration="48.631460146s" podCreationTimestamp="2025-09-13 00:56:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:56:57.611790354 +0000 UTC m=+55.020058618" watchObservedRunningTime="2025-09-13 00:56:57.631460146 +0000 UTC m=+55.039728310" Sep 13 00:56:57.658000 audit[4959]: NETFILTER_CFG table=filter:124 family=2 entries=12 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:57.658000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd68cfb800 a2=0 a3=7ffd68cfb7ec items=0 ppid=2597 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:57.662000 audit[4959]: NETFILTER_CFG table=nat:125 family=2 entries=46 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:57.662000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffd68cfb800 a2=0 a3=7ffd68cfb7ec items=0 ppid=2597 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:57.683000 audit[4961]: NETFILTER_CFG table=filter:126 family=2 entries=12 op=nft_register_rule pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:57.683000 audit[4961]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc7aa2480 a2=0 a3=7fffc7aa246c items=0 ppid=2597 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:57.698000 audit[4961]: NETFILTER_CFG table=nat:127 family=2 entries=58 op=nft_register_chain pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:57.698000 audit[4961]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7fffc7aa2480 a2=0 a3=7fffc7aa246c items=0 ppid=2597 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:57.714640 env[1457]: time="2025-09-13T00:56:57.714590666Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:57.722684 env[1457]: time="2025-09-13T00:56:57.722646981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:57.726770 env[1457]: time="2025-09-13T00:56:57.726739338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:57.730955 env[1457]: time="2025-09-13T00:56:57.730924593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:57.731378 env[1457]: time="2025-09-13T00:56:57.731348789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:56:57.732586 env[1457]: time="2025-09-13T00:56:57.732563676Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 13 00:56:57.735166 env[1457]: time="2025-09-13T00:56:57.735131249Z" level=info msg="CreateContainer within sandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:56:57.776591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount302903385.mount: Deactivated successfully. Sep 13 00:56:57.788215 env[1457]: time="2025-09-13T00:56:57.788175188Z" level=info msg="CreateContainer within sandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\"" Sep 13 00:56:57.788724 env[1457]: time="2025-09-13T00:56:57.788696882Z" level=info msg="StartContainer for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\"" Sep 13 00:56:57.819984 systemd[1]: Started cri-containerd-0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8.scope. Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit: BPF prog-id=214 op=LOAD Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4418 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626263396639386166326539353562646139626163666231623539 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4418 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626263396639386166326539353562646139626163666231623539 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit: BPF prog-id=215 op=LOAD Sep 13 00:56:57.833000 audit[4970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00039d0b0 items=0 ppid=4418 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626263396639386166326539353562646139626163666231623539 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.833000 audit: BPF prog-id=216 op=LOAD Sep 13 00:56:57.833000 audit[4970]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00039d0f8 items=0 ppid=4418 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626263396639386166326539353562646139626163666231623539 Sep 13 00:56:57.833000 audit: BPF prog-id=216 op=UNLOAD Sep 13 00:56:57.834000 audit: BPF prog-id=215 op=UNLOAD Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { perfmon } for pid=4970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit[4970]: AVC avc: denied { bpf } for pid=4970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:57.835000 audit: BPF prog-id=217 op=LOAD Sep 13 00:56:57.835000 audit[4970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00039d508 items=0 ppid=4418 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:57.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626263396639386166326539353562646139626163666231623539 Sep 13 00:56:57.868671 env[1457]: time="2025-09-13T00:56:57.868623636Z" level=info msg="StartContainer for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" returns successfully" Sep 13 00:56:58.426483 systemd[1]: run-containerd-runc-k8s.io-0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8-runc.LnxIHc.mount: Deactivated successfully. Sep 13 00:56:58.611852 kubelet[2493]: I0913 00:56:58.611790 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-756d6c885f-vmgr4" podStartSLOduration=33.856684237 podStartE2EDuration="38.611773023s" podCreationTimestamp="2025-09-13 00:56:20 +0000 UTC" firstStartedPulling="2025-09-13 00:56:52.977310992 +0000 UTC m=+50.385579256" lastFinishedPulling="2025-09-13 00:56:57.732399878 +0000 UTC m=+55.140668042" observedRunningTime="2025-09-13 00:56:58.610226239 +0000 UTC m=+56.018494503" watchObservedRunningTime="2025-09-13 00:56:58.611773023 +0000 UTC m=+56.020041287" Sep 13 00:56:58.645000 audit[5009]: NETFILTER_CFG table=filter:128 family=2 entries=12 op=nft_register_rule pid=5009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:58.645000 audit[5009]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd15b332d0 a2=0 a3=7ffd15b332bc items=0 ppid=2597 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:58.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:58.654000 audit[5009]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:58.654000 audit[5009]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd15b332d0 a2=0 a3=7ffd15b332bc items=0 ppid=2597 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:58.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:58.986000 audit[4980]: AVC avc: denied { watch } for pid=4980 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.4050390805/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c194,c222 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c194,c222 tclass=file permissive=0 Sep 13 00:56:58.986000 audit[4980]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010d91e0 a2=fc6 a3=0 items=0 ppid=4418 pid=4980 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c194,c222 key=(null) Sep 13 00:56:58.986000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:56:59.291000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.291000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.291000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c5fce0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:59.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:59.291000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000afbcb0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:56:59.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:59.377000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.377000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c004788a40 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:56:59.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:59.378000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.378000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007e31590 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:56:59.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:59.381000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.381000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0087d6b40 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:56:59.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:59.390000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7410 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.390000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007e31710 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:56:59.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:59.426000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.426000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00abce4a0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:56:59.426000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:59.427000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:59.427000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0087d6cf0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:56:59.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:59.610432 kubelet[2493]: I0913 00:56:59.610254 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:57:01.548804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1570090980.mount: Deactivated successfully. Sep 13 00:57:02.419189 env[1457]: time="2025-09-13T00:57:02.419140248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.428650 env[1457]: time="2025-09-13T00:57:02.428560652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.433970 env[1457]: time="2025-09-13T00:57:02.433883797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.440926 env[1457]: time="2025-09-13T00:57:02.440840327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.441727 env[1457]: time="2025-09-13T00:57:02.441696918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 13 00:57:02.444975 env[1457]: time="2025-09-13T00:57:02.444937385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:57:02.445318 env[1457]: time="2025-09-13T00:57:02.445291081Z" level=info msg="CreateContainer within sandbox \"44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 13 00:57:02.483768 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1848715058.mount: Deactivated successfully. Sep 13 00:57:02.498835 env[1457]: time="2025-09-13T00:57:02.498795436Z" level=info msg="CreateContainer within sandbox \"44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a\"" Sep 13 00:57:02.500547 env[1457]: time="2025-09-13T00:57:02.500500618Z" level=info msg="StartContainer for \"5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a\"" Sep 13 00:57:02.532468 systemd[1]: Started cri-containerd-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a.scope. Sep 13 00:57:02.563229 kernel: kauditd_printk_skb: 286 callbacks suppressed Sep 13 00:57:02.563343 kernel: audit: type=1400 audit(1757725022.544:1385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.580536 kernel: audit: type=1400 audit(1757725022.544:1386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.580604 kernel: audit: type=1400 audit(1757725022.544:1387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.602921 kernel: audit: type=1400 audit(1757725022.544:1388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.615909 kernel: audit: type=1400 audit(1757725022.544:1389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.628875 kernel: audit: type=1400 audit(1757725022.544:1390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.642246 kernel: audit: type=1400 audit(1757725022.544:1391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.656530 kernel: audit: type=1400 audit(1757725022.544:1392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.658113 kernel: audit: type=1400 audit(1757725022.544:1393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.659651 env[1457]: time="2025-09-13T00:57:02.659618397Z" level=info msg="StartContainer for \"5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a\" returns successfully" Sep 13 00:57:02.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.683985 kernel: audit: type=1400 audit(1757725022.562:1394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit: BPF prog-id=218 op=LOAD Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4462 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561333463306533356335386663366636346461313030373533616262 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=4462 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561333463306533356335386663366636346461313030373533616262 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit: BPF prog-id=219 op=LOAD Sep 13 00:57:02.562000 audit[5020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003d42a0 items=0 ppid=4462 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561333463306533356335386663366636346461313030373533616262 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit: BPF prog-id=220 op=LOAD Sep 13 00:57:02.562000 audit[5020]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003d42e8 items=0 ppid=4462 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561333463306533356335386663366636346461313030373533616262 Sep 13 00:57:02.562000 audit: BPF prog-id=220 op=UNLOAD Sep 13 00:57:02.562000 audit: BPF prog-id=219 op=UNLOAD Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { perfmon } for pid=5020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit[5020]: AVC avc: denied { bpf } for pid=5020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.562000 audit: BPF prog-id=221 op=LOAD Sep 13 00:57:02.562000 audit[5020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003d46f8 items=0 ppid=4462 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561333463306533356335386663366636346461313030373533616262 Sep 13 00:57:02.793744 env[1457]: time="2025-09-13T00:57:02.793700930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.799918 env[1457]: time="2025-09-13T00:57:02.799880467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.803595 env[1457]: time="2025-09-13T00:57:02.803563329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.807416 env[1457]: time="2025-09-13T00:57:02.807387290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:02.807781 env[1457]: time="2025-09-13T00:57:02.807751287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:57:02.809148 env[1457]: time="2025-09-13T00:57:02.809125973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:57:02.810896 env[1457]: time="2025-09-13T00:57:02.810487259Z" level=info msg="CreateContainer within sandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:57:02.868695 env[1457]: time="2025-09-13T00:57:02.868646966Z" level=info msg="CreateContainer within sandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\"" Sep 13 00:57:02.870575 env[1457]: time="2025-09-13T00:57:02.869450958Z" level=info msg="StartContainer for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\"" Sep 13 00:57:02.887967 systemd[1]: Started cri-containerd-5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338.scope. Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.900000 audit: BPF prog-id=222 op=LOAD Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4572 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562656565643836636665323531353062653231663735623262643166 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4572 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562656565643836636665323531353062653231663735623262643166 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit: BPF prog-id=223 op=LOAD Sep 13 00:57:02.901000 audit[5055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003bab70 items=0 ppid=4572 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562656565643836636665323531353062653231663735623262643166 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit: BPF prog-id=224 op=LOAD Sep 13 00:57:02.901000 audit[5055]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003babb8 items=0 ppid=4572 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562656565643836636665323531353062653231663735623262643166 Sep 13 00:57:02.901000 audit: BPF prog-id=224 op=UNLOAD Sep 13 00:57:02.901000 audit: BPF prog-id=223 op=UNLOAD Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:02.901000 audit: BPF prog-id=225 op=LOAD Sep 13 00:57:02.901000 audit[5055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003bafc8 items=0 ppid=4572 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:02.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562656565643836636665323531353062653231663735623262643166 Sep 13 00:57:02.934779 env[1457]: time="2025-09-13T00:57:02.934676393Z" level=info msg="StartContainer for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" returns successfully" Sep 13 00:57:03.306675 env[1457]: time="2025-09-13T00:57:03.306636623Z" level=info msg="StopPodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\"" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.378 [WARNING][5098] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.379 [INFO][5098] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.379 [INFO][5098] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" iface="eth0" netns="" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.379 [INFO][5098] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.379 [INFO][5098] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.440 [INFO][5107] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.440 [INFO][5107] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.440 [INFO][5107] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.447 [WARNING][5107] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.447 [INFO][5107] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.448 [INFO][5107] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:03.454343 env[1457]: 2025-09-13 00:57:03.450 [INFO][5098] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.455291 env[1457]: time="2025-09-13T00:57:03.455248219Z" level=info msg="TearDown network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" successfully" Sep 13 00:57:03.455390 env[1457]: time="2025-09-13T00:57:03.455372618Z" level=info msg="StopPodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" returns successfully" Sep 13 00:57:03.456121 env[1457]: time="2025-09-13T00:57:03.456094810Z" level=info msg="RemovePodSandbox for \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\"" Sep 13 00:57:03.456487 env[1457]: time="2025-09-13T00:57:03.456253909Z" level=info msg="Forcibly stopping sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\"" Sep 13 00:57:03.484257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3512580885.mount: Deactivated successfully. Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.519 [WARNING][5121] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.519 [INFO][5121] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.519 [INFO][5121] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" iface="eth0" netns="" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.519 [INFO][5121] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.519 [INFO][5121] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.565 [INFO][5128] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.565 [INFO][5128] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.566 [INFO][5128] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.573 [WARNING][5128] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.573 [INFO][5128] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" HandleID="k8s-pod-network.37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Workload="ci--3510.3.8--n--0eeb704727-k8s-whisker--55b5cf7bc9--pphsm-eth0" Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.574 [INFO][5128] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:03.578873 env[1457]: 2025-09-13 00:57:03.576 [INFO][5121] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf" Sep 13 00:57:03.578873 env[1457]: time="2025-09-13T00:57:03.578852068Z" level=info msg="TearDown network for sandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" successfully" Sep 13 00:57:03.589911 env[1457]: time="2025-09-13T00:57:03.589873456Z" level=info msg="RemovePodSandbox \"37b060355038724cfbd785b7030fcf144cf1858ce4670a4490bb47a9bd82bcdf\" returns successfully" Sep 13 00:57:03.590439 env[1457]: time="2025-09-13T00:57:03.590412151Z" level=info msg="StopPodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\"" Sep 13 00:57:03.677433 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.VNvYAU.mount: Deactivated successfully. Sep 13 00:57:03.692252 kubelet[2493]: I0913 00:57:03.691188 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-54d579b49d-cdfz4" podStartSLOduration=30.259455445 podStartE2EDuration="39.691148331s" podCreationTimestamp="2025-09-13 00:56:24 +0000 UTC" firstStartedPulling="2025-09-13 00:56:53.011216719 +0000 UTC m=+50.419484883" lastFinishedPulling="2025-09-13 00:57:02.442909605 +0000 UTC m=+59.851177769" observedRunningTime="2025-09-13 00:57:03.658108766 +0000 UTC m=+61.066377030" watchObservedRunningTime="2025-09-13 00:57:03.691148331 +0000 UTC m=+61.099416495" Sep 13 00:57:03.692252 kubelet[2493]: I0913 00:57:03.691483 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-756d6c885f-gm4lp" podStartSLOduration=34.72205891 podStartE2EDuration="43.691463428s" podCreationTimestamp="2025-09-13 00:56:20 +0000 UTC" firstStartedPulling="2025-09-13 00:56:53.839564856 +0000 UTC m=+51.247833120" lastFinishedPulling="2025-09-13 00:57:02.808969374 +0000 UTC m=+60.217237638" observedRunningTime="2025-09-13 00:57:03.691112131 +0000 UTC m=+61.099380295" watchObservedRunningTime="2025-09-13 00:57:03.691463428 +0000 UTC m=+61.099731592" Sep 13 00:57:03.726000 audit[5171]: NETFILTER_CFG table=filter:130 family=2 entries=12 op=nft_register_rule pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:03.726000 audit[5171]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe8c678e00 a2=0 a3=7ffe8c678dec items=0 ppid=2597 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:03.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:03.734000 audit[5171]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:03.734000 audit[5171]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe8c678e00 a2=0 a3=7ffe8c678dec items=0 ppid=2597 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:03.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.643 [WARNING][5142] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e", Pod:"coredns-668d6bf9bc-p4jmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.73/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50bbfa3d844", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.644 [INFO][5142] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.644 [INFO][5142] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" iface="eth0" netns="" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.644 [INFO][5142] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.644 [INFO][5142] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.742 [INFO][5158] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.742 [INFO][5158] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.742 [INFO][5158] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.750 [WARNING][5158] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.751 [INFO][5158] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.754 [INFO][5158] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:03.756889 env[1457]: 2025-09-13 00:57:03.755 [INFO][5142] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.757510 env[1457]: time="2025-09-13T00:57:03.757465060Z" level=info msg="TearDown network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" successfully" Sep 13 00:57:03.757510 env[1457]: time="2025-09-13T00:57:03.757507559Z" level=info msg="StopPodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" returns successfully" Sep 13 00:57:03.758248 env[1457]: time="2025-09-13T00:57:03.758220952Z" level=info msg="RemovePodSandbox for \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\"" Sep 13 00:57:03.758432 env[1457]: time="2025-09-13T00:57:03.758372651Z" level=info msg="Forcibly stopping sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\"" Sep 13 00:57:03.762000 audit[5179]: NETFILTER_CFG table=filter:132 family=2 entries=12 op=nft_register_rule pid=5179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:03.762000 audit[5179]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd7a4ba260 a2=0 a3=7ffd7a4ba24c items=0 ppid=2597 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:03.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:03.766000 audit[5179]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:03.766000 audit[5179]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd7a4ba260 a2=0 a3=7ffd7a4ba24c items=0 ppid=2597 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:03.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.826 [WARNING][5189] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"36bc83e1-d3b5-41bd-a8d0-506bc7e4a92d", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"9397dec3454d0e9968b2a28d728df8d65e29ef7a0be36e6c6aabc0404232383e", Pod:"coredns-668d6bf9bc-p4jmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.73/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50bbfa3d844", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.828 [INFO][5189] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.828 [INFO][5189] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" iface="eth0" netns="" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.828 [INFO][5189] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.828 [INFO][5189] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.868 [INFO][5196] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.868 [INFO][5196] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.868 [INFO][5196] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.882 [WARNING][5196] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.882 [INFO][5196] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" HandleID="k8s-pod-network.1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--p4jmt-eth0" Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.883 [INFO][5196] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:03.888231 env[1457]: 2025-09-13 00:57:03.885 [INFO][5189] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d" Sep 13 00:57:03.889996 env[1457]: time="2025-09-13T00:57:03.889956119Z" level=info msg="TearDown network for sandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" successfully" Sep 13 00:57:03.898720 env[1457]: time="2025-09-13T00:57:03.898685730Z" level=info msg="RemovePodSandbox \"1124a1787e5297ef039659be87698691bcce3f13b2a408ddb74329d58cf5459d\" returns successfully" Sep 13 00:57:03.900582 env[1457]: time="2025-09-13T00:57:03.900556111Z" level=info msg="StopPodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\"" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.020 [WARNING][5211] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7264b389-b98c-40ac-b232-ce7a430c65aa", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d", Pod:"goldmane-54d579b49d-cdfz4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1af7c2d5c31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.024 [INFO][5211] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.024 [INFO][5211] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" iface="eth0" netns="" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.024 [INFO][5211] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.024 [INFO][5211] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.051 [INFO][5218] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.051 [INFO][5218] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.052 [INFO][5218] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.063 [WARNING][5218] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.063 [INFO][5218] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.065 [INFO][5218] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:04.067278 env[1457]: 2025-09-13 00:57:04.066 [INFO][5211] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.067917 env[1457]: time="2025-09-13T00:57:04.067307728Z" level=info msg="TearDown network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" successfully" Sep 13 00:57:04.067917 env[1457]: time="2025-09-13T00:57:04.067345028Z" level=info msg="StopPodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" returns successfully" Sep 13 00:57:04.068286 env[1457]: time="2025-09-13T00:57:04.068261118Z" level=info msg="RemovePodSandbox for \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\"" Sep 13 00:57:04.068430 env[1457]: time="2025-09-13T00:57:04.068390317Z" level=info msg="Forcibly stopping sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\"" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.123 [WARNING][5232] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7264b389-b98c-40ac-b232-ce7a430c65aa", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"44ca19b7a3bab18ed23a2aebb803235bede4accba6c4090d026460ec8be5655d", Pod:"goldmane-54d579b49d-cdfz4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1af7c2d5c31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.123 [INFO][5232] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.123 [INFO][5232] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" iface="eth0" netns="" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.123 [INFO][5232] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.123 [INFO][5232] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.155 [INFO][5240] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.155 [INFO][5240] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.155 [INFO][5240] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.162 [WARNING][5240] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.162 [INFO][5240] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" HandleID="k8s-pod-network.e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Workload="ci--3510.3.8--n--0eeb704727-k8s-goldmane--54d579b49d--cdfz4-eth0" Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.163 [INFO][5240] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:04.167816 env[1457]: 2025-09-13 00:57:04.166 [INFO][5232] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1" Sep 13 00:57:04.168533 env[1457]: time="2025-09-13T00:57:04.168481711Z" level=info msg="TearDown network for sandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" successfully" Sep 13 00:57:04.630254 kubelet[2493]: I0913 00:57:04.630224 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:57:04.656622 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.NY6YFh.mount: Deactivated successfully. Sep 13 00:57:04.790000 audit[5066]: AVC avc: denied { watch } for pid=5066 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.1247282848/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c749 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c228,c749 tclass=file permissive=0 Sep 13 00:57:04.790000 audit[5066]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f761c0 a2=fc6 a3=0 items=0 ppid=4572 pid=5066 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c749 key=(null) Sep 13 00:57:04.790000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:57:05.165000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:05.165000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e49920 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:05.165000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002c3d80 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e49940 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000102540 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:05.660485 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.RIJEdV.mount: Deactivated successfully. Sep 13 00:57:07.093646 env[1457]: time="2025-09-13T00:57:07.093588717Z" level=info msg="RemovePodSandbox \"e2f10240b4745d1c6573fe249441d6346490e89c8897f964577689123f9af0b1\" returns successfully" Sep 13 00:57:07.094579 env[1457]: time="2025-09-13T00:57:07.094541908Z" level=info msg="StopPodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\"" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.127 [WARNING][5319] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6", Pod:"coredns-668d6bf9bc-ll9c8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif464d21f1a7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.128 [INFO][5319] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.128 [INFO][5319] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" iface="eth0" netns="" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.128 [INFO][5319] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.128 [INFO][5319] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.154 [INFO][5327] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.154 [INFO][5327] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.154 [INFO][5327] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.159 [WARNING][5327] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.159 [INFO][5327] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.160 [INFO][5327] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:07.163023 env[1457]: 2025-09-13 00:57:07.161 [INFO][5319] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.163678 env[1457]: time="2025-09-13T00:57:07.163053132Z" level=info msg="TearDown network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" successfully" Sep 13 00:57:07.163678 env[1457]: time="2025-09-13T00:57:07.163088632Z" level=info msg="StopPodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" returns successfully" Sep 13 00:57:07.163678 env[1457]: time="2025-09-13T00:57:07.163593427Z" level=info msg="RemovePodSandbox for \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\"" Sep 13 00:57:07.163678 env[1457]: time="2025-09-13T00:57:07.163631827Z" level=info msg="Forcibly stopping sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\"" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.194 [WARNING][5342] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"bdc39956-1ca6-45f4-86e0-ace05fcdfaf5", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"1d7fd5f5696ff8cadea14bad9fddbb6368db5995a240f8f8fb27234ab9a7c1d6", Pod:"coredns-668d6bf9bc-ll9c8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif464d21f1a7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.194 [INFO][5342] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.194 [INFO][5342] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" iface="eth0" netns="" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.194 [INFO][5342] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.194 [INFO][5342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.215 [INFO][5349] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.215 [INFO][5349] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.215 [INFO][5349] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.220 [WARNING][5349] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.220 [INFO][5349] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" HandleID="k8s-pod-network.ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Workload="ci--3510.3.8--n--0eeb704727-k8s-coredns--668d6bf9bc--ll9c8-eth0" Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.222 [INFO][5349] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:07.224267 env[1457]: 2025-09-13 00:57:07.223 [INFO][5342] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022" Sep 13 00:57:07.224815 env[1457]: time="2025-09-13T00:57:07.224775624Z" level=info msg="TearDown network for sandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" successfully" Sep 13 00:57:07.723238 env[1457]: time="2025-09-13T00:57:07.723185909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:07.726244 env[1457]: time="2025-09-13T00:57:07.726205779Z" level=info msg="RemovePodSandbox \"ef70fd6911cace02f90be4fbe3ea709c51847f9c91d775ba94897d59597a0022\" returns successfully" Sep 13 00:57:07.726788 env[1457]: time="2025-09-13T00:57:07.726762474Z" level=info msg="StopPodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\"" Sep 13 00:57:07.738850 env[1457]: time="2025-09-13T00:57:07.738813355Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:07.745467 env[1457]: time="2025-09-13T00:57:07.745440390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:07.746549 env[1457]: time="2025-09-13T00:57:07.746505379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:07.747074 env[1457]: time="2025-09-13T00:57:07.747041374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:57:07.748898 env[1457]: time="2025-09-13T00:57:07.748871556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 13 00:57:07.751213 env[1457]: time="2025-09-13T00:57:07.751182933Z" level=info msg="CreateContainer within sandbox \"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:57:07.781936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3907737908.mount: Deactivated successfully. Sep 13 00:57:07.796634 env[1457]: time="2025-09-13T00:57:07.796591885Z" level=info msg="CreateContainer within sandbox \"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"46aa2fd9c4adfeedc9b109faac09af23fe8cf9a0174d98829cd12e5648a6624a\"" Sep 13 00:57:07.798766 env[1457]: time="2025-09-13T00:57:07.798737064Z" level=info msg="StartContainer for \"46aa2fd9c4adfeedc9b109faac09af23fe8cf9a0174d98829cd12e5648a6624a\"" Sep 13 00:57:07.834787 systemd[1]: Started cri-containerd-46aa2fd9c4adfeedc9b109faac09af23fe8cf9a0174d98829cd12e5648a6624a.scope. Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.796 [WARNING][5364] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f64e1518-9dc7-4135-aa11-2d5bffea4ae3", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7", Pod:"calico-apiserver-756d6c885f-gm4lp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac6f797160d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.796 [INFO][5364] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.796 [INFO][5364] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" iface="eth0" netns="" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.796 [INFO][5364] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.796 [INFO][5364] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.834 [INFO][5371] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.835 [INFO][5371] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.841 [INFO][5371] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.853 [WARNING][5371] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.853 [INFO][5371] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.861 [INFO][5371] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:07.868327 env[1457]: 2025-09-13 00:57:07.863 [INFO][5364] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:07.868870 env[1457]: time="2025-09-13T00:57:07.868367277Z" level=info msg="TearDown network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" successfully" Sep 13 00:57:07.868870 env[1457]: time="2025-09-13T00:57:07.868401877Z" level=info msg="StopPodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" returns successfully" Sep 13 00:57:07.869317 env[1457]: time="2025-09-13T00:57:07.869290668Z" level=info msg="RemovePodSandbox for \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\"" Sep 13 00:57:07.869499 env[1457]: time="2025-09-13T00:57:07.869464367Z" level=info msg="Forcibly stopping sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\"" Sep 13 00:57:07.892087 kernel: kauditd_printk_skb: 131 callbacks suppressed Sep 13 00:57:07.892214 kernel: audit: type=1400 audit(1757725027.872:1430): avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2308440a88 items=0 ppid=4104 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:07.913559 kernel: audit: type=1300 audit(1757725027.872:1430): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2308440a88 items=0 ppid=4104 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:07.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616132666439633461646665656463396231303966616163303961 Sep 13 00:57:07.935538 kernel: audit: type=1327 audit(1757725027.872:1430): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616132666439633461646665656463396231303966616163303961 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.963327 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.978644 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.978719 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.979025 env[1457]: time="2025-09-13T00:57:07.978993587Z" level=info msg="StartContainer for \"46aa2fd9c4adfeedc9b109faac09af23fe8cf9a0174d98829cd12e5648a6624a\" returns successfully" Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:08.004905 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:08.021007 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:08.021084 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:08.046507 kernel: audit: type=1400 audit(1757725027.872:1431): avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.872000 audit: BPF prog-id=226 op=LOAD Sep 13 00:57:07.872000 audit[5384]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000312828 items=0 ppid=4104 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:07.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616132666439633461646665656463396231303966616163303961 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.911000 audit: BPF prog-id=227 op=LOAD Sep 13 00:57:07.911000 audit[5384]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000312878 items=0 ppid=4104 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:07.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616132666439633461646665656463396231303966616163303961 Sep 13 00:57:07.912000 audit: BPF prog-id=227 op=UNLOAD Sep 13 00:57:07.912000 audit: BPF prog-id=226 op=UNLOAD Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { perfmon } for pid=5384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit[5384]: AVC avc: denied { bpf } for pid=5384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:07.912000 audit: BPF prog-id=228 op=LOAD Sep 13 00:57:07.912000 audit[5384]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000312908 items=0 ppid=4104 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:07.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616132666439633461646665656463396231303966616163303961 Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.001 [WARNING][5410] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f64e1518-9dc7-4135-aa11-2d5bffea4ae3", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7", Pod:"calico-apiserver-756d6c885f-gm4lp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac6f797160d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.002 [INFO][5410] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.002 [INFO][5410] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" iface="eth0" netns="" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.002 [INFO][5410] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.002 [INFO][5410] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.039 [INFO][5430] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.039 [INFO][5430] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.039 [INFO][5430] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.047 [WARNING][5430] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.047 [INFO][5430] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" HandleID="k8s-pod-network.c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.049 [INFO][5430] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.052962 env[1457]: 2025-09-13 00:57:08.051 [INFO][5410] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80" Sep 13 00:57:08.053429 env[1457]: time="2025-09-13T00:57:08.053389256Z" level=info msg="TearDown network for sandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" successfully" Sep 13 00:57:08.068998 env[1457]: time="2025-09-13T00:57:08.068954704Z" level=info msg="RemovePodSandbox \"c27b570103d6b11402c0e86b8c41d42f23973df2cfc284c4d242d2a4230a4f80\" returns successfully" Sep 13 00:57:08.069600 env[1457]: time="2025-09-13T00:57:08.069569998Z" level=info msg="StopPodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\"" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.105 [WARNING][5444] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0", GenerateName:"calico-kube-controllers-687cd554b6-", Namespace:"calico-system", SelfLink:"", UID:"502d5c2b-eda9-42cc-894a-209da2a4fe8a", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687cd554b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7", Pod:"calico-kube-controllers-687cd554b6-dlwkd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2a59258dc81", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.106 [INFO][5444] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.106 [INFO][5444] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" iface="eth0" netns="" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.106 [INFO][5444] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.106 [INFO][5444] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.127 [INFO][5451] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.128 [INFO][5451] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.128 [INFO][5451] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.133 [WARNING][5451] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.133 [INFO][5451] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.134 [INFO][5451] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.136780 env[1457]: 2025-09-13 00:57:08.135 [INFO][5444] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.137590 env[1457]: time="2025-09-13T00:57:08.136816338Z" level=info msg="TearDown network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" successfully" Sep 13 00:57:08.137590 env[1457]: time="2025-09-13T00:57:08.136853838Z" level=info msg="StopPodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" returns successfully" Sep 13 00:57:08.137847 env[1457]: time="2025-09-13T00:57:08.137820429Z" level=info msg="RemovePodSandbox for \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\"" Sep 13 00:57:08.137960 env[1457]: time="2025-09-13T00:57:08.137918228Z" level=info msg="Forcibly stopping sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\"" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.170 [WARNING][5466] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0", GenerateName:"calico-kube-controllers-687cd554b6-", Namespace:"calico-system", SelfLink:"", UID:"502d5c2b-eda9-42cc-894a-209da2a4fe8a", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"687cd554b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7", Pod:"calico-kube-controllers-687cd554b6-dlwkd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2a59258dc81", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.170 [INFO][5466] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.170 [INFO][5466] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" iface="eth0" netns="" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.170 [INFO][5466] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.170 [INFO][5466] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.197 [INFO][5473] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.197 [INFO][5473] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.197 [INFO][5473] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.204 [WARNING][5473] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.204 [INFO][5473] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" HandleID="k8s-pod-network.ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--kube--controllers--687cd554b6--dlwkd-eth0" Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.205 [INFO][5473] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.207420 env[1457]: 2025-09-13 00:57:08.206 [INFO][5466] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf" Sep 13 00:57:08.208056 env[1457]: time="2025-09-13T00:57:08.207452046Z" level=info msg="TearDown network for sandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" successfully" Sep 13 00:57:08.216344 env[1457]: time="2025-09-13T00:57:08.216016862Z" level=info msg="RemovePodSandbox \"ea9f5937a3cdb6a9055b2a64de9d2db94372f455d9fd76af774e83660afe55cf\" returns successfully" Sep 13 00:57:08.216625 env[1457]: time="2025-09-13T00:57:08.216598857Z" level=info msg="StopPodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\"" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.251 [WARNING][5493] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8743e6b0-f51c-4f1f-842b-0b583fb9e879", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae", Pod:"csi-node-driver-4vpwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calideeb9cd8e7c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.252 [INFO][5493] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.252 [INFO][5493] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" iface="eth0" netns="" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.252 [INFO][5493] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.252 [INFO][5493] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.276 [INFO][5502] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.276 [INFO][5502] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.277 [INFO][5502] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.282 [WARNING][5502] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.283 [INFO][5502] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.284 [INFO][5502] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.289657 env[1457]: 2025-09-13 00:57:08.287 [INFO][5493] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.291602 env[1457]: time="2025-09-13T00:57:08.289624041Z" level=info msg="TearDown network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" successfully" Sep 13 00:57:08.291746 env[1457]: time="2025-09-13T00:57:08.291720920Z" level=info msg="StopPodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" returns successfully" Sep 13 00:57:08.292816 env[1457]: time="2025-09-13T00:57:08.292782210Z" level=info msg="RemovePodSandbox for \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\"" Sep 13 00:57:08.292906 env[1457]: time="2025-09-13T00:57:08.292815110Z" level=info msg="Forcibly stopping sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\"" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.324 [WARNING][5517] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8743e6b0-f51c-4f1f-842b-0b583fb9e879", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"abe7a9f6dc0b5c08fc5b6fcf6c4b2bd7a62ba49eba5a0eb109e364cfb18cb2ae", Pod:"csi-node-driver-4vpwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calideeb9cd8e7c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.325 [INFO][5517] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.325 [INFO][5517] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" iface="eth0" netns="" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.325 [INFO][5517] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.325 [INFO][5517] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.349 [INFO][5524] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.349 [INFO][5524] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.349 [INFO][5524] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.354 [WARNING][5524] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.355 [INFO][5524] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" HandleID="k8s-pod-network.360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Workload="ci--3510.3.8--n--0eeb704727-k8s-csi--node--driver--4vpwd-eth0" Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.356 [INFO][5524] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.359851 env[1457]: 2025-09-13 00:57:08.357 [INFO][5517] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46" Sep 13 00:57:08.360503 env[1457]: time="2025-09-13T00:57:08.359873452Z" level=info msg="TearDown network for sandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" successfully" Sep 13 00:57:08.374897 env[1457]: time="2025-09-13T00:57:08.374859406Z" level=info msg="RemovePodSandbox \"360795821b125488c12700f33217ea02dad9512bc026cb113d436f0924c15b46\" returns successfully" Sep 13 00:57:08.375491 env[1457]: time="2025-09-13T00:57:08.375395700Z" level=info msg="StopPodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\"" Sep 13 00:57:08.424980 kubelet[2493]: I0913 00:57:08.424489 2493 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:57:08.424980 kubelet[2493]: I0913 00:57:08.424535 2493 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.408 [WARNING][5538] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0", GenerateName:"calico-apiserver-7fdb94b7b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"3ee92753-0503-4301-9dd8-260e451cee11", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fdb94b7b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264", Pod:"calico-apiserver-7fdb94b7b4-b7x7p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali520e4fb3ccd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.408 [INFO][5538] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.408 [INFO][5538] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" iface="eth0" netns="" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.408 [INFO][5538] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.409 [INFO][5538] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.436 [INFO][5545] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.436 [INFO][5545] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.436 [INFO][5545] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.442 [WARNING][5545] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.442 [INFO][5545] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.444 [INFO][5545] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.448758 env[1457]: 2025-09-13 00:57:08.446 [INFO][5538] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.448758 env[1457]: time="2025-09-13T00:57:08.448208787Z" level=info msg="TearDown network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" successfully" Sep 13 00:57:08.448758 env[1457]: time="2025-09-13T00:57:08.448245086Z" level=info msg="StopPodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" returns successfully" Sep 13 00:57:08.448758 env[1457]: time="2025-09-13T00:57:08.448720882Z" level=info msg="RemovePodSandbox for \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\"" Sep 13 00:57:08.449547 env[1457]: time="2025-09-13T00:57:08.448754781Z" level=info msg="Forcibly stopping sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\"" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.483 [WARNING][5559] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0", GenerateName:"calico-apiserver-7fdb94b7b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"3ee92753-0503-4301-9dd8-260e451cee11", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fdb94b7b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264", Pod:"calico-apiserver-7fdb94b7b4-b7x7p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali520e4fb3ccd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.483 [INFO][5559] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.483 [INFO][5559] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" iface="eth0" netns="" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.483 [INFO][5559] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.483 [INFO][5559] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.507 [INFO][5567] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.507 [INFO][5567] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.507 [INFO][5567] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.513 [WARNING][5567] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.513 [INFO][5567] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" HandleID="k8s-pod-network.7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--b7x7p-eth0" Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.514 [INFO][5567] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.516934 env[1457]: 2025-09-13 00:57:08.515 [INFO][5559] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7" Sep 13 00:57:08.517567 env[1457]: time="2025-09-13T00:57:08.517500608Z" level=info msg="TearDown network for sandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" successfully" Sep 13 00:57:08.537274 env[1457]: time="2025-09-13T00:57:08.537236014Z" level=info msg="RemovePodSandbox \"7d726ed760c3e7d86f90e889dfd137f8fb9c751513e9bc40a798a3d7895c64d7\" returns successfully" Sep 13 00:57:08.537846 env[1457]: time="2025-09-13T00:57:08.537814409Z" level=info msg="StopPodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\"" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.568 [WARNING][5581] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"dc0f281d-1747-48f1-a1ba-e361ef4367c0", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e", Pod:"calico-apiserver-756d6c885f-vmgr4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib8d9f904706", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.569 [INFO][5581] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.569 [INFO][5581] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" iface="eth0" netns="" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.569 [INFO][5581] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.569 [INFO][5581] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.590 [INFO][5589] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.590 [INFO][5589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.590 [INFO][5589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.597 [WARNING][5589] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.597 [INFO][5589] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.598 [INFO][5589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.601622 env[1457]: 2025-09-13 00:57:08.599 [INFO][5581] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.601622 env[1457]: time="2025-09-13T00:57:08.600758692Z" level=info msg="TearDown network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" successfully" Sep 13 00:57:08.601622 env[1457]: time="2025-09-13T00:57:08.600797091Z" level=info msg="StopPodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" returns successfully" Sep 13 00:57:08.602813 env[1457]: time="2025-09-13T00:57:08.602392876Z" level=info msg="RemovePodSandbox for \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\"" Sep 13 00:57:08.602813 env[1457]: time="2025-09-13T00:57:08.602431975Z" level=info msg="Forcibly stopping sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\"" Sep 13 00:57:08.664800 kubelet[2493]: I0913 00:57:08.664587 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-4vpwd" podStartSLOduration=27.133061609 podStartE2EDuration="43.664567166s" podCreationTimestamp="2025-09-13 00:56:25 +0000 UTC" firstStartedPulling="2025-09-13 00:56:51.216633606 +0000 UTC m=+48.624901870" lastFinishedPulling="2025-09-13 00:57:07.748139263 +0000 UTC m=+65.156407427" observedRunningTime="2025-09-13 00:57:08.664406168 +0000 UTC m=+66.072674432" watchObservedRunningTime="2025-09-13 00:57:08.664567166 +0000 UTC m=+66.072835330" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.639 [WARNING][5604] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0", GenerateName:"calico-apiserver-756d6c885f-", Namespace:"calico-apiserver", SelfLink:"", UID:"dc0f281d-1747-48f1-a1ba-e361ef4367c0", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"756d6c885f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e", Pod:"calico-apiserver-756d6c885f-vmgr4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib8d9f904706", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.639 [INFO][5604] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.639 [INFO][5604] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" iface="eth0" netns="" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.639 [INFO][5604] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.639 [INFO][5604] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.677 [INFO][5611] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.677 [INFO][5611] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.678 [INFO][5611] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.682 [WARNING][5611] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.682 [INFO][5611] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" HandleID="k8s-pod-network.f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.684 [INFO][5611] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:08.686044 env[1457]: 2025-09-13 00:57:08.685 [INFO][5604] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a" Sep 13 00:57:08.686643 env[1457]: time="2025-09-13T00:57:08.686608450Z" level=info msg="TearDown network for sandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" successfully" Sep 13 00:57:08.698420 env[1457]: time="2025-09-13T00:57:08.698380235Z" level=info msg="RemovePodSandbox \"f516f5b3601f56d60651753d55a9fea25d5b2f9c38731224df636de70b38ba4a\" returns successfully" Sep 13 00:57:09.613580 kubelet[2493]: I0913 00:57:09.613338 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:57:09.664000 audit[5618]: NETFILTER_CFG table=filter:134 family=2 entries=11 op=nft_register_rule pid=5618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:09.664000 audit[5618]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe79ec3a10 a2=0 a3=7ffe79ec39fc items=0 ppid=2597 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:09.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:09.674000 audit[5618]: NETFILTER_CFG table=nat:135 family=2 entries=29 op=nft_register_chain pid=5618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:09.674000 audit[5618]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffe79ec3a10 a2=0 a3=7ffe79ec39fc items=0 ppid=2597 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:09.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:11.754855 env[1457]: time="2025-09-13T00:57:11.754806282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:11.763820 env[1457]: time="2025-09-13T00:57:11.763780396Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:11.766981 env[1457]: time="2025-09-13T00:57:11.766899366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:11.770836 env[1457]: time="2025-09-13T00:57:11.770807228Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:11.771240 env[1457]: time="2025-09-13T00:57:11.771209024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 13 00:57:11.774169 env[1457]: time="2025-09-13T00:57:11.772666810Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:57:11.789144 env[1457]: time="2025-09-13T00:57:11.789107052Z" level=info msg="CreateContainer within sandbox \"90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 13 00:57:11.825915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3154215946.mount: Deactivated successfully. Sep 13 00:57:11.837563 env[1457]: time="2025-09-13T00:57:11.837505586Z" level=info msg="CreateContainer within sandbox \"90e9553a2c90fe551c5c7b6ea613386b34cb88e93cbb3c15c114e28ecd8277f7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144\"" Sep 13 00:57:11.838116 env[1457]: time="2025-09-13T00:57:11.838031181Z" level=info msg="StartContainer for \"cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144\"" Sep 13 00:57:11.873182 systemd[1]: Started cri-containerd-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144.scope. Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.887000 audit: BPF prog-id=229 op=LOAD Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4698 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:11.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323439633363653430323033643136306435656134383337613064 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4698 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:11.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323439633363653430323033643136306435656134383337613064 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit: BPF prog-id=230 op=LOAD Sep 13 00:57:11.888000 audit[5630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000345df0 items=0 ppid=4698 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:11.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323439633363653430323033643136306435656134383337613064 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit: BPF prog-id=231 op=LOAD Sep 13 00:57:11.888000 audit[5630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000345e38 items=0 ppid=4698 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:11.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323439633363653430323033643136306435656134383337613064 Sep 13 00:57:11.888000 audit: BPF prog-id=231 op=UNLOAD Sep 13 00:57:11.888000 audit: BPF prog-id=230 op=UNLOAD Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { perfmon } for pid=5630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit[5630]: AVC avc: denied { bpf } for pid=5630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:11.888000 audit: BPF prog-id=232 op=LOAD Sep 13 00:57:11.888000 audit[5630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a8248 items=0 ppid=4698 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:11.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323439633363653430323033643136306435656134383337613064 Sep 13 00:57:11.925536 env[1457]: time="2025-09-13T00:57:11.924172351Z" level=info msg="StartContainer for \"cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144\" returns successfully" Sep 13 00:57:12.115277 env[1457]: time="2025-09-13T00:57:12.115152318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:12.123494 env[1457]: time="2025-09-13T00:57:12.123454438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:12.129137 env[1457]: time="2025-09-13T00:57:12.129102184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:12.134695 env[1457]: time="2025-09-13T00:57:12.134660531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:57:12.135711 env[1457]: time="2025-09-13T00:57:12.135678421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:57:12.139118 env[1457]: time="2025-09-13T00:57:12.139087689Z" level=info msg="CreateContainer within sandbox \"1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:57:12.185435 env[1457]: time="2025-09-13T00:57:12.185381345Z" level=info msg="CreateContainer within sandbox \"1b6842debef9be71b702a38bae36c505aeabf3c43d5dc16451a0f783d4cb6264\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"04f6af352457b29b83e7296f1f08f23a195cc073cbacf4cfc6cacbbbcc1d9b9e\"" Sep 13 00:57:12.186601 env[1457]: time="2025-09-13T00:57:12.186569334Z" level=info msg="StartContainer for \"04f6af352457b29b83e7296f1f08f23a195cc073cbacf4cfc6cacbbbcc1d9b9e\"" Sep 13 00:57:12.211505 systemd[1]: Started cri-containerd-04f6af352457b29b83e7296f1f08f23a195cc073cbacf4cfc6cacbbbcc1d9b9e.scope. Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.231000 audit: BPF prog-id=233 op=LOAD Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4846 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034663661663335323435376232396238336537323936663166303866 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4846 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034663661663335323435376232396238336537323936663166303866 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit: BPF prog-id=234 op=LOAD Sep 13 00:57:12.232000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000243c0 items=0 ppid=4846 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034663661663335323435376232396238336537323936663166303866 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.232000 audit: BPF prog-id=235 op=LOAD Sep 13 00:57:12.232000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024408 items=0 ppid=4846 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034663661663335323435376232396238336537323936663166303866 Sep 13 00:57:12.233000 audit: BPF prog-id=235 op=UNLOAD Sep 13 00:57:12.233000 audit: BPF prog-id=234 op=UNLOAD Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:12.233000 audit: BPF prog-id=236 op=LOAD Sep 13 00:57:12.233000 audit[5679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024818 items=0 ppid=4846 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034663661663335323435376232396238336537323936663166303866 Sep 13 00:57:12.274040 env[1457]: time="2025-09-13T00:57:12.273993996Z" level=info msg="StartContainer for \"04f6af352457b29b83e7296f1f08f23a195cc073cbacf4cfc6cacbbbcc1d9b9e\" returns successfully" Sep 13 00:57:12.708745 kubelet[2493]: I0913 00:57:12.708670 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-687cd554b6-dlwkd" podStartSLOduration=30.617692429999998 podStartE2EDuration="47.708648534s" podCreationTimestamp="2025-09-13 00:56:25 +0000 UTC" firstStartedPulling="2025-09-13 00:56:54.681203711 +0000 UTC m=+52.089471875" lastFinishedPulling="2025-09-13 00:57:11.772159715 +0000 UTC m=+69.180427979" observedRunningTime="2025-09-13 00:57:12.685846952 +0000 UTC m=+70.094115216" watchObservedRunningTime="2025-09-13 00:57:12.708648534 +0000 UTC m=+70.116916798" Sep 13 00:57:12.737000 audit[5732]: NETFILTER_CFG table=filter:136 family=2 entries=10 op=nft_register_rule pid=5732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:12.737000 audit[5732]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb2ab7b70 a2=0 a3=7ffcb2ab7b5c items=0 ppid=2597 pid=5732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:12.740000 audit[5732]: NETFILTER_CFG table=nat:137 family=2 entries=32 op=nft_register_rule pid=5732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:12.740000 audit[5732]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffcb2ab7b70 a2=0 a3=7ffcb2ab7b5c items=0 ppid=2597 pid=5732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:12.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:12.752084 kubelet[2493]: I0913 00:57:12.752018 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fdb94b7b4-b7x7p" podStartSLOduration=36.03260185 podStartE2EDuration="51.751997218s" podCreationTimestamp="2025-09-13 00:56:21 +0000 UTC" firstStartedPulling="2025-09-13 00:56:56.417967237 +0000 UTC m=+53.826235401" lastFinishedPulling="2025-09-13 00:57:12.137362605 +0000 UTC m=+69.545630769" observedRunningTime="2025-09-13 00:57:12.712968592 +0000 UTC m=+70.121236756" watchObservedRunningTime="2025-09-13 00:57:12.751997218 +0000 UTC m=+70.160265482" Sep 13 00:57:13.659552 kernel: kauditd_printk_skb: 159 callbacks suppressed Sep 13 00:57:13.659703 kernel: audit: type=1400 audit(1757725033.647:1476): avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 00:57:13.647000 audit[5692]: AVC avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 00:57:13.668238 kubelet[2493]: I0913 00:57:13.668209 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:57:13.647000 audit[5692]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000680f20 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 00:57:13.694893 kernel: audit: type=1300 audit(1757725033.647:1476): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000680f20 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 00:57:13.647000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:57:13.712973 kernel: audit: type=1327 audit(1757725033.647:1476): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:57:16.495244 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.nxkNGo.mount: Deactivated successfully. Sep 13 00:57:16.585392 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.koxSLk.mount: Deactivated successfully. Sep 13 00:57:20.351366 kubelet[2493]: I0913 00:57:20.351246 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:57:20.399000 audit[5780]: NETFILTER_CFG table=filter:138 family=2 entries=10 op=nft_register_rule pid=5780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.399000 audit[5780]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc46963990 a2=0 a3=7ffc4696397c items=0 ppid=2597 pid=5780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.431784 env[1457]: time="2025-09-13T00:57:20.426736326Z" level=info msg="StopContainer for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" with timeout 30 (s)" Sep 13 00:57:20.432123 kubelet[2493]: I0913 00:57:20.425769 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:57:20.432483 env[1457]: time="2025-09-13T00:57:20.432449874Z" level=info msg="Stop container \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" with signal terminated" Sep 13 00:57:20.434384 kernel: audit: type=1325 audit(1757725040.399:1477): table=filter:138 family=2 entries=10 op=nft_register_rule pid=5780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.434493 kernel: audit: type=1300 audit(1757725040.399:1477): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc46963990 a2=0 a3=7ffc4696397c items=0 ppid=2597 pid=5780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:20.455549 kernel: audit: type=1327 audit(1757725040.399:1477): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:20.460000 audit[5780]: NETFILTER_CFG table=nat:139 family=2 entries=36 op=nft_register_chain pid=5780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.460000 audit[5780]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffc46963990 a2=0 a3=7ffc4696397c items=0 ppid=2597 pid=5780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.482692 systemd[1]: cri-containerd-0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8.scope: Deactivated successfully. Sep 13 00:57:20.502084 kernel: audit: type=1325 audit(1757725040.460:1478): table=nat:139 family=2 entries=36 op=nft_register_chain pid=5780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.502191 kernel: audit: type=1300 audit(1757725040.460:1478): arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffc46963990 a2=0 a3=7ffc4696397c items=0 ppid=2597 pid=5780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.523684 systemd[1]: Created slice kubepods-besteffort-pod4fecf172_cc4e_429d_b5cf_b988eb43ed84.slice. Sep 13 00:57:20.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:20.550410 kernel: audit: type=1327 audit(1757725040.460:1478): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:20.550506 kernel: audit: type=1334 audit(1757725040.482:1479): prog-id=214 op=UNLOAD Sep 13 00:57:20.482000 audit: BPF prog-id=214 op=UNLOAD Sep 13 00:57:20.549753 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8-rootfs.mount: Deactivated successfully. Sep 13 00:57:20.514000 audit: BPF prog-id=217 op=UNLOAD Sep 13 00:57:20.558064 kernel: audit: type=1334 audit(1757725040.514:1480): prog-id=217 op=UNLOAD Sep 13 00:57:20.537000 audit[5794]: NETFILTER_CFG table=filter:140 family=2 entries=10 op=nft_register_rule pid=5794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.565629 kubelet[2493]: I0913 00:57:20.565599 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4fecf172-cc4e-429d-b5cf-b988eb43ed84-calico-apiserver-certs\") pod \"calico-apiserver-7fdb94b7b4-td2ph\" (UID: \"4fecf172-cc4e-429d-b5cf-b988eb43ed84\") " pod="calico-apiserver/calico-apiserver-7fdb94b7b4-td2ph" Sep 13 00:57:20.565800 kubelet[2493]: I0913 00:57:20.565787 2493 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2xsd\" (UniqueName: \"kubernetes.io/projected/4fecf172-cc4e-429d-b5cf-b988eb43ed84-kube-api-access-k2xsd\") pod \"calico-apiserver-7fdb94b7b4-td2ph\" (UID: \"4fecf172-cc4e-429d-b5cf-b988eb43ed84\") " pod="calico-apiserver/calico-apiserver-7fdb94b7b4-td2ph" Sep 13 00:57:20.537000 audit[5794]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdaa1ebd30 a2=0 a3=7ffdaa1ebd1c items=0 ppid=2597 pid=5794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.591754 kernel: audit: type=1325 audit(1757725040.537:1481): table=filter:140 family=2 entries=10 op=nft_register_rule pid=5794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.591834 kernel: audit: type=1300 audit(1757725040.537:1481): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdaa1ebd30 a2=0 a3=7ffdaa1ebd1c items=0 ppid=2597 pid=5794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:20.562000 audit[5794]: NETFILTER_CFG table=nat:141 family=2 entries=38 op=nft_register_rule pid=5794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:20.562000 audit[5794]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffdaa1ebd30 a2=0 a3=7ffdaa1ebd1c items=0 ppid=2597 pid=5794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:20.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:20.828395 env[1457]: time="2025-09-13T00:57:20.828360328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fdb94b7b4-td2ph,Uid:4fecf172-cc4e-429d-b5cf-b988eb43ed84,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:57:22.908459 env[1457]: time="2025-09-13T00:57:22.908402086Z" level=info msg="shim disconnected" id=0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8 Sep 13 00:57:22.908954 env[1457]: time="2025-09-13T00:57:22.908460286Z" level=warning msg="cleaning up after shim disconnected" id=0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8 namespace=k8s.io Sep 13 00:57:22.908954 env[1457]: time="2025-09-13T00:57:22.908473286Z" level=info msg="cleaning up dead shim" Sep 13 00:57:22.933769 env[1457]: time="2025-09-13T00:57:22.933714355Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:57:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5805 runtime=io.containerd.runc.v2\n" Sep 13 00:57:22.948436 env[1457]: time="2025-09-13T00:57:22.948396621Z" level=info msg="StopContainer for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" returns successfully" Sep 13 00:57:22.950491 env[1457]: time="2025-09-13T00:57:22.950459602Z" level=info msg="StopPodSandbox for \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\"" Sep 13 00:57:22.950615 env[1457]: time="2025-09-13T00:57:22.950564002Z" level=info msg="Container to stop \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 13 00:57:22.954912 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e-shm.mount: Deactivated successfully. Sep 13 00:57:22.976000 audit: BPF prog-id=183 op=UNLOAD Sep 13 00:57:22.976561 systemd[1]: cri-containerd-ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e.scope: Deactivated successfully. Sep 13 00:57:22.980000 audit: BPF prog-id=186 op=UNLOAD Sep 13 00:57:23.016117 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e-rootfs.mount: Deactivated successfully. Sep 13 00:57:23.019527 env[1457]: time="2025-09-13T00:57:23.019468473Z" level=info msg="shim disconnected" id=ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e Sep 13 00:57:23.021276 env[1457]: time="2025-09-13T00:57:23.021138258Z" level=warning msg="cleaning up after shim disconnected" id=ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e namespace=k8s.io Sep 13 00:57:23.021374 env[1457]: time="2025-09-13T00:57:23.021361556Z" level=info msg="cleaning up dead shim" Sep 13 00:57:23.037368 env[1457]: time="2025-09-13T00:57:23.037330211Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:57:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5856 runtime=io.containerd.runc.v2\n" Sep 13 00:57:23.063084 systemd-networkd[1604]: cali2e2d4c5f2e1: Link UP Sep 13 00:57:23.075217 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:57:23.075353 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2e2d4c5f2e1: link becomes ready Sep 13 00:57:23.079823 systemd-networkd[1604]: cali2e2d4c5f2e1: Gained carrier Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:22.971 [INFO][5809] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0 calico-apiserver-7fdb94b7b4- calico-apiserver 4fecf172-cc4e-429d-b5cf-b988eb43ed84 1133 0 2025-09-13 00:57:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fdb94b7b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-0eeb704727 calico-apiserver-7fdb94b7b4-td2ph eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2e2d4c5f2e1 [] [] }} ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:22.971 [INFO][5809] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.003 [INFO][5836] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" HandleID="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.004 [INFO][5836] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" HandleID="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251210), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-0eeb704727", "pod":"calico-apiserver-7fdb94b7b4-td2ph", "timestamp":"2025-09-13 00:57:23.003886315 +0000 UTC"}, Hostname:"ci-3510.3.8-n-0eeb704727", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.004 [INFO][5836] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.004 [INFO][5836] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.004 [INFO][5836] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-0eeb704727' Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.012 [INFO][5836] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.022 [INFO][5836] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.029 [INFO][5836] ipam/ipam.go 511: Trying affinity for 192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.031 [INFO][5836] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.034 [INFO][5836] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.034 [INFO][5836] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.035 [INFO][5836] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.040 [INFO][5836] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.055 [INFO][5836] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.74/26] block=192.168.113.64/26 handle="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.055 [INFO][5836] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.74/26] handle="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" host="ci-3510.3.8-n-0eeb704727" Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.056 [INFO][5836] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:23.106727 env[1457]: 2025-09-13 00:57:23.056 [INFO][5836] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.74/26] IPv6=[] ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" HandleID="k8s-pod-network.431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.107886 env[1457]: 2025-09-13 00:57:23.060 [INFO][5809] cni-plugin/k8s.go 418: Populated endpoint ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0", GenerateName:"calico-apiserver-7fdb94b7b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"4fecf172-cc4e-429d-b5cf-b988eb43ed84", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 57, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fdb94b7b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"", Pod:"calico-apiserver-7fdb94b7b4-td2ph", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.74/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e2d4c5f2e1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:23.107886 env[1457]: 2025-09-13 00:57:23.060 [INFO][5809] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.74/32] ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.107886 env[1457]: 2025-09-13 00:57:23.060 [INFO][5809] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2e2d4c5f2e1 ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.107886 env[1457]: 2025-09-13 00:57:23.081 [INFO][5809] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.107886 env[1457]: 2025-09-13 00:57:23.081 [INFO][5809] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0", GenerateName:"calico-apiserver-7fdb94b7b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"4fecf172-cc4e-429d-b5cf-b988eb43ed84", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 57, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fdb94b7b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-0eeb704727", ContainerID:"431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b", Pod:"calico-apiserver-7fdb94b7b4-td2ph", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.74/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e2d4c5f2e1", MAC:"be:a8:b5:7b:b7:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:57:23.107886 env[1457]: 2025-09-13 00:57:23.104 [INFO][5809] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b" Namespace="calico-apiserver" Pod="calico-apiserver-7fdb94b7b4-td2ph" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--7fdb94b7b4--td2ph-eth0" Sep 13 00:57:23.130999 env[1457]: time="2025-09-13T00:57:23.130937460Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:57:23.131218 env[1457]: time="2025-09-13T00:57:23.131192057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:57:23.131327 env[1457]: time="2025-09-13T00:57:23.131307156Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:57:23.131649 env[1457]: time="2025-09-13T00:57:23.131610254Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b pid=5905 runtime=io.containerd.runc.v2 Sep 13 00:57:23.148000 audit[5906]: NETFILTER_CFG table=filter:142 family=2 entries=67 op=nft_register_chain pid=5906 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:23.148000 audit[5906]: SYSCALL arch=c000003e syscall=46 success=yes exit=31836 a0=3 a1=7ffefa2c9680 a2=0 a3=7ffefa2c966c items=0 ppid=3830 pid=5906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.148000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:23.157099 systemd[1]: Started cri-containerd-431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b.scope. Sep 13 00:57:23.170742 systemd-networkd[1604]: calib8d9f904706: Link DOWN Sep 13 00:57:23.170752 systemd-networkd[1604]: calib8d9f904706: Lost carrier Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.208000 audit: BPF prog-id=237 op=LOAD Sep 13 00:57:23.209000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.209000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5905 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313935356333306138353863373764623635623234623264366665 Sep 13 00:57:23.209000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.209000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5905 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313935356333306138353863373764623635623234623264366665 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit: BPF prog-id=238 op=LOAD Sep 13 00:57:23.210000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025720 items=0 ppid=5905 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313935356333306138353863373764623635623234623264366665 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.210000 audit: BPF prog-id=239 op=LOAD Sep 13 00:57:23.210000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025768 items=0 ppid=5905 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313935356333306138353863373764623635623234623264366665 Sep 13 00:57:23.211000 audit: BPF prog-id=239 op=UNLOAD Sep 13 00:57:23.211000 audit: BPF prog-id=238 op=UNLOAD Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.211000 audit: BPF prog-id=240 op=LOAD Sep 13 00:57:23.211000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025b78 items=0 ppid=5905 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313935356333306138353863373764623635623234623264366665 Sep 13 00:57:23.225000 audit[5941]: NETFILTER_CFG table=filter:143 family=2 entries=55 op=nft_register_rule pid=5941 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:23.225000 audit[5941]: SYSCALL arch=c000003e syscall=46 success=yes exit=8912 a0=3 a1=7ffca05ddaf0 a2=0 a3=7ffca05ddadc items=0 ppid=3830 pid=5941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:23.226000 audit[5941]: NETFILTER_CFG table=filter:144 family=2 entries=2 op=nft_unregister_chain pid=5941 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:23.226000 audit[5941]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca05ddaf0 a2=0 a3=562590700000 items=0 ppid=3830 pid=5941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:23.275351 env[1457]: time="2025-09-13T00:57:23.275308647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fdb94b7b4-td2ph,Uid:4fecf172-cc4e-429d-b5cf-b988eb43ed84,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b\"" Sep 13 00:57:23.278470 env[1457]: time="2025-09-13T00:57:23.278437419Z" level=info msg="CreateContainer within sandbox \"431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.162 [INFO][5881] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.164 [INFO][5881] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" iface="eth0" netns="/var/run/netns/cni-bdd13c46-f9c3-6ea2-6785-7d89691df391" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.164 [INFO][5881] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" iface="eth0" netns="/var/run/netns/cni-bdd13c46-f9c3-6ea2-6785-7d89691df391" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.179 [INFO][5881] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" after=15.112763ms iface="eth0" netns="/var/run/netns/cni-bdd13c46-f9c3-6ea2-6785-7d89691df391" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.179 [INFO][5881] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.179 [INFO][5881] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.238 [INFO][5929] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.239 [INFO][5929] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.239 [INFO][5929] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.293 [INFO][5929] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.293 [INFO][5929] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.294 [INFO][5929] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:23.296355 env[1457]: 2025-09-13 00:57:23.295 [INFO][5881] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:57:23.296972 env[1457]: time="2025-09-13T00:57:23.296589854Z" level=info msg="TearDown network for sandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" successfully" Sep 13 00:57:23.296972 env[1457]: time="2025-09-13T00:57:23.296626553Z" level=info msg="StopPodSandbox for \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" returns successfully" Sep 13 00:57:23.322212 env[1457]: time="2025-09-13T00:57:23.322172021Z" level=info msg="CreateContainer within sandbox \"431955c30a858c77db65b24b2d6fe885cd592230d897e2a0991a7afabbf4586b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ed1d93af412fda37b5699efa368125c3242ea94c357453237f9884580624affd\"" Sep 13 00:57:23.322893 env[1457]: time="2025-09-13T00:57:23.322859815Z" level=info msg="StartContainer for \"ed1d93af412fda37b5699efa368125c3242ea94c357453237f9884580624affd\"" Sep 13 00:57:23.357825 systemd[1]: Started cri-containerd-ed1d93af412fda37b5699efa368125c3242ea94c357453237f9884580624affd.scope. Sep 13 00:57:23.368000 audit[5968]: NETFILTER_CFG table=filter:145 family=2 entries=10 op=nft_register_rule pid=5968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:23.368000 audit[5968]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe9eeac510 a2=0 a3=7ffe9eeac4fc items=0 ppid=2597 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:23.374000 audit[5968]: NETFILTER_CFG table=nat:146 family=2 entries=38 op=nft_register_rule pid=5968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:23.374000 audit[5968]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffe9eeac510 a2=0 a3=7ffe9eeac4fc items=0 ppid=2597 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.381000 audit: BPF prog-id=241 op=LOAD Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5905 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316439336166343132666461333762353639396566613336383132 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5905 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316439336166343132666461333762353639396566613336383132 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit: BPF prog-id=242 op=LOAD Sep 13 00:57:23.382000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000355d20 items=0 ppid=5905 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316439336166343132666461333762353639396566613336383132 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit: BPF prog-id=243 op=LOAD Sep 13 00:57:23.382000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000355d68 items=0 ppid=5905 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316439336166343132666461333762353639396566613336383132 Sep 13 00:57:23.382000 audit: BPF prog-id=243 op=UNLOAD Sep 13 00:57:23.382000 audit: BPF prog-id=242 op=UNLOAD Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:57:23.382000 audit: BPF prog-id=244 op=LOAD Sep 13 00:57:23.382000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be178 items=0 ppid=5905 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316439336166343132666461333762353639396566613336383132 Sep 13 00:57:23.430888 env[1457]: time="2025-09-13T00:57:23.427309465Z" level=info msg="StartContainer for \"ed1d93af412fda37b5699efa368125c3242ea94c357453237f9884580624affd\" returns successfully" Sep 13 00:57:23.485466 kubelet[2493]: I0913 00:57:23.485422 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dc0f281d-1747-48f1-a1ba-e361ef4367c0-calico-apiserver-certs\") pod \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\" (UID: \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\") " Sep 13 00:57:23.485932 kubelet[2493]: I0913 00:57:23.485490 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-q2c95\" (UniqueName: \"kubernetes.io/projected/dc0f281d-1747-48f1-a1ba-e361ef4367c0-kube-api-access-q2c95\") pod \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\" (UID: \"dc0f281d-1747-48f1-a1ba-e361ef4367c0\") " Sep 13 00:57:23.489203 kubelet[2493]: I0913 00:57:23.489165 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/dc0f281d-1747-48f1-a1ba-e361ef4367c0-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "dc0f281d-1747-48f1-a1ba-e361ef4367c0" (UID: "dc0f281d-1747-48f1-a1ba-e361ef4367c0"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:57:23.489303 kubelet[2493]: I0913 00:57:23.489172 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/dc0f281d-1747-48f1-a1ba-e361ef4367c0-kube-api-access-q2c95" (OuterVolumeSpecName: "kube-api-access-q2c95") pod "dc0f281d-1747-48f1-a1ba-e361ef4367c0" (UID: "dc0f281d-1747-48f1-a1ba-e361ef4367c0"). InnerVolumeSpecName "kube-api-access-q2c95". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:57:23.585934 kubelet[2493]: I0913 00:57:23.585899 2493 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dc0f281d-1747-48f1-a1ba-e361ef4367c0-calico-apiserver-certs\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:57:23.586241 kubelet[2493]: I0913 00:57:23.586226 2493 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-q2c95\" (UniqueName: \"kubernetes.io/projected/dc0f281d-1747-48f1-a1ba-e361ef4367c0-kube-api-access-q2c95\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:57:23.695942 kubelet[2493]: I0913 00:57:23.695919 2493 scope.go:117] "RemoveContainer" containerID="0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8" Sep 13 00:57:23.700730 systemd[1]: Removed slice kubepods-besteffort-poddc0f281d_1747_48f1_a1ba_e361ef4367c0.slice. Sep 13 00:57:23.705305 env[1457]: time="2025-09-13T00:57:23.704975541Z" level=info msg="RemoveContainer for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\"" Sep 13 00:57:23.719967 env[1457]: time="2025-09-13T00:57:23.719934305Z" level=info msg="RemoveContainer for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" returns successfully" Sep 13 00:57:23.720441 kubelet[2493]: I0913 00:57:23.720425 2493 scope.go:117] "RemoveContainer" containerID="0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8" Sep 13 00:57:23.720937 env[1457]: time="2025-09-13T00:57:23.720790597Z" level=error msg="ContainerStatus for \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\": not found" Sep 13 00:57:23.721209 kubelet[2493]: E0913 00:57:23.721188 2493 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\": not found" containerID="0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8" Sep 13 00:57:23.721345 kubelet[2493]: I0913 00:57:23.721321 2493 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8"} err="failed to get container status \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\": rpc error: code = NotFound desc = an error occurred when try to find container \"0cbbc9f98af2e955bda9bacfb1b592eb690b1ead8da3a03492396e6f3e05ffa8\": not found" Sep 13 00:57:23.725379 kubelet[2493]: I0913 00:57:23.725332 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fdb94b7b4-td2ph" podStartSLOduration=3.725305556 podStartE2EDuration="3.725305556s" podCreationTimestamp="2025-09-13 00:57:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:57:23.722784479 +0000 UTC m=+81.131052743" watchObservedRunningTime="2025-09-13 00:57:23.725305556 +0000 UTC m=+81.133573720" Sep 13 00:57:23.762000 audit[5995]: NETFILTER_CFG table=filter:147 family=2 entries=10 op=nft_register_rule pid=5995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:23.762000 audit[5995]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffefe52cc90 a2=0 a3=7ffefe52cc7c items=0 ppid=2597 pid=5995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:23.766000 audit[5995]: NETFILTER_CFG table=nat:148 family=2 entries=38 op=nft_register_rule pid=5995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:23.766000 audit[5995]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffefe52cc90 a2=0 a3=7ffefe52cc7c items=0 ppid=2597 pid=5995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:23.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:23.910337 systemd[1]: run-netns-cni\x2dbdd13c46\x2df9c3\x2d6ea2\x2d6785\x2d7d89691df391.mount: Deactivated successfully. Sep 13 00:57:23.910439 systemd[1]: var-lib-kubelet-pods-dc0f281d\x2d1747\x2d48f1\x2da1ba\x2de361ef4367c0-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Sep 13 00:57:23.910526 systemd[1]: var-lib-kubelet-pods-dc0f281d\x2d1747\x2d48f1\x2da1ba\x2de361ef4367c0-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dq2c95.mount: Deactivated successfully. Sep 13 00:57:24.843836 systemd-networkd[1604]: cali2e2d4c5f2e1: Gained IPv6LL Sep 13 00:57:25.101000 audit[5970]: AVC avc: denied { watch } for pid=5970 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_57_20.593248143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c136 tclass=file permissive=0 Sep 13 00:57:25.101000 audit[5970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005217e0 a2=fc6 a3=0 items=0 ppid=5905 pid=5970 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 key=(null) Sep 13 00:57:25.101000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:57:25.186783 env[1457]: time="2025-09-13T00:57:25.186740818Z" level=info msg="StopContainer for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" with timeout 30 (s)" Sep 13 00:57:25.187233 env[1457]: time="2025-09-13T00:57:25.187159014Z" level=info msg="Stop container \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" with signal terminated" Sep 13 00:57:25.194000 audit[5998]: NETFILTER_CFG table=filter:149 family=2 entries=10 op=nft_register_rule pid=5998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:25.194000 audit[5998]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcbd534c70 a2=0 a3=7ffcbd534c5c items=0 ppid=2597 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:25.211000 audit[5998]: NETFILTER_CFG table=nat:150 family=2 entries=42 op=nft_register_chain pid=5998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:25.211000 audit[5998]: SYSCALL arch=c000003e syscall=46 success=yes exit=13892 a0=3 a1=7ffcbd534c70 a2=0 a3=7ffcbd534c5c items=0 ppid=2597 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:25.221000 audit: BPF prog-id=222 op=UNLOAD Sep 13 00:57:25.221246 systemd[1]: cri-containerd-5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338.scope: Deactivated successfully. Sep 13 00:57:25.221570 systemd[1]: cri-containerd-5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338.scope: Consumed 1.396s CPU time. Sep 13 00:57:25.224000 audit: BPF prog-id=225 op=UNLOAD Sep 13 00:57:25.250424 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338-rootfs.mount: Deactivated successfully. Sep 13 00:57:25.345290 kubelet[2493]: I0913 00:57:25.345231 2493 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="dc0f281d-1747-48f1-a1ba-e361ef4367c0" path="/var/lib/kubelet/pods/dc0f281d-1747-48f1-a1ba-e361ef4367c0/volumes" Sep 13 00:57:25.354817 env[1457]: time="2025-09-13T00:57:25.354707371Z" level=info msg="shim disconnected" id=5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338 Sep 13 00:57:25.355070 env[1457]: time="2025-09-13T00:57:25.355048069Z" level=warning msg="cleaning up after shim disconnected" id=5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338 namespace=k8s.io Sep 13 00:57:25.355155 env[1457]: time="2025-09-13T00:57:25.355142268Z" level=info msg="cleaning up dead shim" Sep 13 00:57:25.364706 env[1457]: time="2025-09-13T00:57:25.364655504Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:57:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6018 runtime=io.containerd.runc.v2\n" Sep 13 00:57:25.372948 env[1457]: time="2025-09-13T00:57:25.372916448Z" level=info msg="StopContainer for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" returns successfully" Sep 13 00:57:25.373571 env[1457]: time="2025-09-13T00:57:25.373550244Z" level=info msg="StopPodSandbox for \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\"" Sep 13 00:57:25.373717 env[1457]: time="2025-09-13T00:57:25.373702843Z" level=info msg="Container to stop \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 13 00:57:25.378649 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7-shm.mount: Deactivated successfully. Sep 13 00:57:25.394730 systemd[1]: cri-containerd-5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7.scope: Deactivated successfully. Sep 13 00:57:25.394000 audit: BPF prog-id=191 op=UNLOAD Sep 13 00:57:25.398000 audit: BPF prog-id=194 op=UNLOAD Sep 13 00:57:25.418742 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7-rootfs.mount: Deactivated successfully. Sep 13 00:57:25.420402 env[1457]: time="2025-09-13T00:57:25.420332527Z" level=info msg="shim disconnected" id=5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7 Sep 13 00:57:25.421140 env[1457]: time="2025-09-13T00:57:25.421119622Z" level=warning msg="cleaning up after shim disconnected" id=5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7 namespace=k8s.io Sep 13 00:57:25.421229 env[1457]: time="2025-09-13T00:57:25.421219021Z" level=info msg="cleaning up dead shim" Sep 13 00:57:25.429008 env[1457]: time="2025-09-13T00:57:25.428975969Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:57:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6051 runtime=io.containerd.runc.v2\n" Sep 13 00:57:25.499215 systemd-networkd[1604]: caliac6f797160d: Link DOWN Sep 13 00:57:25.499224 systemd-networkd[1604]: caliac6f797160d: Lost carrier Sep 13 00:57:25.543000 audit[6089]: NETFILTER_CFG table=filter:151 family=2 entries=51 op=nft_register_rule pid=6089 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:25.558162 kernel: kauditd_printk_skb: 154 callbacks suppressed Sep 13 00:57:25.558313 kernel: audit: type=1325 audit(1757725045.543:1535): table=filter:151 family=2 entries=51 op=nft_register_rule pid=6089 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:25.543000 audit[6089]: SYSCALL arch=c000003e syscall=46 success=yes exit=7724 a0=3 a1=7ffc38b120c0 a2=0 a3=7ffc38b120ac items=0 ppid=3830 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.581926 kernel: audit: type=1300 audit(1757725045.543:1535): arch=c000003e syscall=46 success=yes exit=7724 a0=3 a1=7ffc38b120c0 a2=0 a3=7ffc38b120ac items=0 ppid=3830 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.543000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:25.593846 kernel: audit: type=1327 audit(1757725045.543:1535): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:25.543000 audit[6089]: NETFILTER_CFG table=filter:152 family=2 entries=2 op=nft_unregister_chain pid=6089 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.498 [INFO][6073] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.498 [INFO][6073] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" iface="eth0" netns="/var/run/netns/cni-1fa67a12-34bf-8db1-3e5e-dc7f5df2679b" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.498 [INFO][6073] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" iface="eth0" netns="/var/run/netns/cni-1fa67a12-34bf-8db1-3e5e-dc7f5df2679b" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.509 [INFO][6073] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" after=11.145125ms iface="eth0" netns="/var/run/netns/cni-1fa67a12-34bf-8db1-3e5e-dc7f5df2679b" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.509 [INFO][6073] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.509 [INFO][6073] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.546 [INFO][6080] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.546 [INFO][6080] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.546 [INFO][6080] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.597 [INFO][6080] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.597 [INFO][6080] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.598 [INFO][6080] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:57:25.605280 env[1457]: 2025-09-13 00:57:25.599 [INFO][6073] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:57:25.606958 kernel: audit: type=1325 audit(1757725045.543:1536): table=filter:152 family=2 entries=2 op=nft_unregister_chain pid=6089 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:57:25.607005 kernel: audit: type=1300 audit(1757725045.543:1536): arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc38b120c0 a2=0 a3=55935ffcd000 items=0 ppid=3830 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.543000 audit[6089]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc38b120c0 a2=0 a3=55935ffcd000 items=0 ppid=3830 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.615236 systemd[1]: run-netns-cni\x2d1fa67a12\x2d34bf\x2d8db1\x2d3e5e\x2ddc7f5df2679b.mount: Deactivated successfully. Sep 13 00:57:25.626721 env[1457]: time="2025-09-13T00:57:25.626679331Z" level=info msg="TearDown network for sandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" successfully" Sep 13 00:57:25.627377 env[1457]: time="2025-09-13T00:57:25.627342627Z" level=info msg="StopPodSandbox for \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" returns successfully" Sep 13 00:57:25.543000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:25.641534 kernel: audit: type=1327 audit(1757725045.543:1536): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:57:25.668000 audit[6092]: NETFILTER_CFG table=filter:153 family=2 entries=10 op=nft_register_rule pid=6092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:25.668000 audit[6092]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffea8d87c50 a2=0 a3=7ffea8d87c3c items=0 ppid=2597 pid=6092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.702101 kernel: audit: type=1325 audit(1757725045.668:1537): table=filter:153 family=2 entries=10 op=nft_register_rule pid=6092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:25.702248 kernel: audit: type=1300 audit(1757725045.668:1537): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffea8d87c50 a2=0 a3=7ffea8d87c3c items=0 ppid=2597 pid=6092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.702288 kernel: audit: type=1327 audit(1757725045.668:1537): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:25.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:25.704007 kubelet[2493]: I0913 00:57:25.703986 2493 scope.go:117] "RemoveContainer" containerID="5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338" Sep 13 00:57:25.705129 env[1457]: time="2025-09-13T00:57:25.705101101Z" level=info msg="RemoveContainer for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\"" Sep 13 00:57:25.720076 env[1457]: time="2025-09-13T00:57:25.720034200Z" level=info msg="RemoveContainer for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" returns successfully" Sep 13 00:57:25.731879 kernel: audit: type=1325 audit(1757725045.717:1538): table=nat:154 family=2 entries=42 op=nft_unregister_chain pid=6092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:25.717000 audit[6092]: NETFILTER_CFG table=nat:154 family=2 entries=42 op=nft_unregister_chain pid=6092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:25.732109 env[1457]: time="2025-09-13T00:57:25.721907087Z" level=error msg="ContainerStatus for \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\": not found" Sep 13 00:57:25.732158 kubelet[2493]: I0913 00:57:25.721707 2493 scope.go:117] "RemoveContainer" containerID="5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338" Sep 13 00:57:25.732158 kubelet[2493]: E0913 00:57:25.722072 2493 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\": not found" containerID="5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338" Sep 13 00:57:25.732158 kubelet[2493]: I0913 00:57:25.722094 2493 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338"} err="failed to get container status \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\": rpc error: code = NotFound desc = an error occurred when try to find container \"5beeed86cfe25150be21f75b2bd1fd0d488b1fe8c2bc57ca17b9faa057fc6338\": not found" Sep 13 00:57:25.717000 audit[6092]: SYSCALL arch=c000003e syscall=46 success=yes exit=12132 a0=3 a1=7ffea8d87c50 a2=0 a3=7ffea8d87c3c items=0 ppid=2597 pid=6092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:25.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:25.807577 kubelet[2493]: I0913 00:57:25.807533 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-2sxrn\" (UniqueName: \"kubernetes.io/projected/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-kube-api-access-2sxrn\") pod \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\" (UID: \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\") " Sep 13 00:57:25.807759 kubelet[2493]: I0913 00:57:25.807612 2493 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-calico-apiserver-certs\") pod \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\" (UID: \"f64e1518-9dc7-4135-aa11-2d5bffea4ae3\") " Sep 13 00:57:25.815575 kubelet[2493]: I0913 00:57:25.815540 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-kube-api-access-2sxrn" (OuterVolumeSpecName: "kube-api-access-2sxrn") pod "f64e1518-9dc7-4135-aa11-2d5bffea4ae3" (UID: "f64e1518-9dc7-4135-aa11-2d5bffea4ae3"). InnerVolumeSpecName "kube-api-access-2sxrn". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:57:25.815564 systemd[1]: var-lib-kubelet-pods-f64e1518\x2d9dc7\x2d4135\x2daa11\x2d2d5bffea4ae3-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d2sxrn.mount: Deactivated successfully. Sep 13 00:57:25.819553 kubelet[2493]: I0913 00:57:25.818788 2493 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "f64e1518-9dc7-4135-aa11-2d5bffea4ae3" (UID: "f64e1518-9dc7-4135-aa11-2d5bffea4ae3"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:57:25.908074 kubelet[2493]: I0913 00:57:25.907974 2493 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-calico-apiserver-certs\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:57:25.908074 kubelet[2493]: I0913 00:57:25.908005 2493 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-2sxrn\" (UniqueName: \"kubernetes.io/projected/f64e1518-9dc7-4135-aa11-2d5bffea4ae3-kube-api-access-2sxrn\") on node \"ci-3510.3.8-n-0eeb704727\" DevicePath \"\"" Sep 13 00:57:26.007504 systemd[1]: Removed slice kubepods-besteffort-podf64e1518_9dc7_4135_aa11_2d5bffea4ae3.slice. Sep 13 00:57:26.007640 systemd[1]: kubepods-besteffort-podf64e1518_9dc7_4135_aa11_2d5bffea4ae3.slice: Consumed 1.433s CPU time. Sep 13 00:57:26.253989 systemd[1]: var-lib-kubelet-pods-f64e1518\x2d9dc7\x2d4135\x2daa11\x2d2d5bffea4ae3-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Sep 13 00:57:27.315950 kubelet[2493]: I0913 00:57:27.315916 2493 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="f64e1518-9dc7-4135-aa11-2d5bffea4ae3" path="/var/lib/kubelet/pods/f64e1518-9dc7-4135-aa11-2d5bffea4ae3/volumes" Sep 13 00:57:35.671542 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.Q4sLcF.mount: Deactivated successfully. Sep 13 00:57:35.817000 audit[6125]: NETFILTER_CFG table=filter:155 family=2 entries=9 op=nft_register_rule pid=6125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:35.823984 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 00:57:35.824085 kernel: audit: type=1325 audit(1757725055.817:1539): table=filter:155 family=2 entries=9 op=nft_register_rule pid=6125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:35.817000 audit[6125]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff9e0bd130 a2=0 a3=7fff9e0bd11c items=0 ppid=2597 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:35.853773 kernel: audit: type=1300 audit(1757725055.817:1539): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff9e0bd130 a2=0 a3=7fff9e0bd11c items=0 ppid=2597 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:35.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:35.864586 kernel: audit: type=1327 audit(1757725055.817:1539): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:35.864000 audit[6125]: NETFILTER_CFG table=nat:156 family=2 entries=31 op=nft_register_chain pid=6125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:35.864000 audit[6125]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fff9e0bd130 a2=0 a3=7fff9e0bd11c items=0 ppid=2597 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:35.896908 kernel: audit: type=1325 audit(1757725055.864:1540): table=nat:156 family=2 entries=31 op=nft_register_chain pid=6125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:57:35.897051 kernel: audit: type=1300 audit(1757725055.864:1540): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fff9e0bd130 a2=0 a3=7fff9e0bd11c items=0 ppid=2597 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:57:35.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:35.914542 kernel: audit: type=1327 audit(1757725055.864:1540): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:57:46.589215 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.RCskxh.mount: Deactivated successfully. Sep 13 00:57:52.670282 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.QtDBY7.mount: Deactivated successfully. Sep 13 00:57:59.291000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.320302 kernel: audit: type=1400 audit(1757725079.291:1541): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.320439 kernel: audit: type=1300 audit(1757725079.291:1541): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5e820 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:59.291000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5e820 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:59.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:59.355071 kernel: audit: type=1327 audit(1757725079.291:1541): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:59.355212 kernel: audit: type=1400 audit(1757725079.291:1542): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.291000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.291000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000afa180 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:59.398691 kernel: audit: type=1300 audit(1757725079.291:1542): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000afa180 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:57:59.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:59.419649 kernel: audit: type=1327 audit(1757725079.291:1542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:57:59.395000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7410 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.439486 kernel: audit: type=1400 audit(1757725079.395:1543): avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7410 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.395000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006aa0b70 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.463542 kernel: audit: type=1300 audit(1757725079.395:1543): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006aa0b70 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.463682 kernel: audit: type=1327 audit(1757725079.395:1543): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:57:59.395000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:57:59.395000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.395000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0042fc720 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.395000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:57:59.395000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.395000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006aa0bd0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.395000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:57:59.397000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.397000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010b9cbd0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.397000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:57:59.433000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.506527 kernel: audit: type=1400 audit(1757725079.395:1544): avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.433000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006aa0f00 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.433000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:57:59.433000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:57:59.433000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0042fd240 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:57:59.433000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:58:05.165000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.171237 kernel: kauditd_printk_skb: 14 callbacks suppressed Sep 13 00:58:05.171348 kernel: audit: type=1400 audit(1757725085.165:1549): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.165000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5ec20 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.187554 kernel: audit: type=1300 audit(1757725085.165:1549): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5ec20 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.165000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.210539 kernel: audit: type=1327 audit(1757725085.165:1549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.227540 kernel: audit: type=1400 audit(1757725085.166:1550): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028fbe40 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.264699 kernel: audit: type=1300 audit(1757725085.166:1550): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028fbe40 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.264780 kernel: audit: type=1327 audit(1757725085.166:1550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.282554 kernel: audit: type=1400 audit(1757725085.167:1551): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.167000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.167000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5ec60 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.321667 kernel: audit: type=1300 audit(1757725085.167:1551): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5ec60 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.321773 kernel: audit: type=1327 audit(1757725085.167:1551): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.167000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.356123 kernel: audit: type=1400 audit(1757725085.167:1552): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:05.167000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028fbfe0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:05.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:05.390028 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.a8YfCv.mount: Deactivated successfully. Sep 13 00:58:05.662878 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.Uw10hw.mount: Deactivated successfully. Sep 13 00:58:08.701795 env[1457]: time="2025-09-13T00:58:08.701750335Z" level=info msg="StopPodSandbox for \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\"" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.734 [WARNING][6248] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.734 [INFO][6248] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.734 [INFO][6248] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" iface="eth0" netns="" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.734 [INFO][6248] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.734 [INFO][6248] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.754 [INFO][6255] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.754 [INFO][6255] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.754 [INFO][6255] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.759 [WARNING][6255] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.759 [INFO][6255] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.760 [INFO][6255] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:58:08.763080 env[1457]: 2025-09-13 00:58:08.762 [INFO][6248] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.763646 env[1457]: time="2025-09-13T00:58:08.763114058Z" level=info msg="TearDown network for sandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" successfully" Sep 13 00:58:08.763646 env[1457]: time="2025-09-13T00:58:08.763152358Z" level=info msg="StopPodSandbox for \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" returns successfully" Sep 13 00:58:08.763728 env[1457]: time="2025-09-13T00:58:08.763697260Z" level=info msg="RemovePodSandbox for \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\"" Sep 13 00:58:08.763779 env[1457]: time="2025-09-13T00:58:08.763737160Z" level=info msg="Forcibly stopping sandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\"" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.794 [WARNING][6270] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.794 [INFO][6270] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.794 [INFO][6270] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" iface="eth0" netns="" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.794 [INFO][6270] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.794 [INFO][6270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.815 [INFO][6277] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.815 [INFO][6277] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.815 [INFO][6277] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.821 [WARNING][6277] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.821 [INFO][6277] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" HandleID="k8s-pod-network.5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--gm4lp-eth0" Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.822 [INFO][6277] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:58:08.824569 env[1457]: 2025-09-13 00:58:08.823 [INFO][6270] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7" Sep 13 00:58:08.825161 env[1457]: time="2025-09-13T00:58:08.824598682Z" level=info msg="TearDown network for sandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" successfully" Sep 13 00:58:08.837222 env[1457]: time="2025-09-13T00:58:08.837180827Z" level=info msg="RemovePodSandbox \"5f0ea6c34f3c08d16fbad3b78c9742c61ef392df069d1618886c7991acc114d7\" returns successfully" Sep 13 00:58:08.837709 env[1457]: time="2025-09-13T00:58:08.837680529Z" level=info msg="StopPodSandbox for \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\"" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.867 [WARNING][6292] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.867 [INFO][6292] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.867 [INFO][6292] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" iface="eth0" netns="" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.867 [INFO][6292] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.867 [INFO][6292] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.887 [INFO][6299] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.887 [INFO][6299] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.887 [INFO][6299] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.894 [WARNING][6299] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.894 [INFO][6299] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.895 [INFO][6299] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:58:08.897941 env[1457]: 2025-09-13 00:58:08.896 [INFO][6292] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.898475 env[1457]: time="2025-09-13T00:58:08.897978649Z" level=info msg="TearDown network for sandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" successfully" Sep 13 00:58:08.898475 env[1457]: time="2025-09-13T00:58:08.898016249Z" level=info msg="StopPodSandbox for \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" returns successfully" Sep 13 00:58:08.898601 env[1457]: time="2025-09-13T00:58:08.898573651Z" level=info msg="RemovePodSandbox for \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\"" Sep 13 00:58:08.898698 env[1457]: time="2025-09-13T00:58:08.898633051Z" level=info msg="Forcibly stopping sandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\"" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.929 [WARNING][6314] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" WorkloadEndpoint="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.929 [INFO][6314] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.929 [INFO][6314] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" iface="eth0" netns="" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.929 [INFO][6314] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.929 [INFO][6314] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.948 [INFO][6322] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.948 [INFO][6322] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.948 [INFO][6322] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.954 [WARNING][6322] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.954 [INFO][6322] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" HandleID="k8s-pod-network.ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Workload="ci--3510.3.8--n--0eeb704727-k8s-calico--apiserver--756d6c885f--vmgr4-eth0" Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.955 [INFO][6322] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:58:08.959488 env[1457]: 2025-09-13 00:58:08.956 [INFO][6314] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e" Sep 13 00:58:08.959488 env[1457]: time="2025-09-13T00:58:08.957849766Z" level=info msg="TearDown network for sandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" successfully" Sep 13 00:58:08.968782 env[1457]: time="2025-09-13T00:58:08.968746206Z" level=info msg="RemovePodSandbox \"ddb34601e730e244180edf15c70b73f24e48453e108802b944932685b1cd238e\" returns successfully" Sep 13 00:58:12.684287 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.Q7GM5y.mount: Deactivated successfully. Sep 13 00:58:13.655000 audit[5692]: AVC avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 00:58:13.660969 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 00:58:13.661076 kernel: audit: type=1400 audit(1757725093.655:1553): avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 00:58:13.655000 audit[5692]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00137cfe0 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 00:58:13.700535 kernel: audit: type=1300 audit(1757725093.655:1553): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00137cfe0 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 00:58:13.655000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:58:13.718929 kernel: audit: type=1327 audit(1757725093.655:1553): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:58:16.581494 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.hvt9F1.mount: Deactivated successfully. Sep 13 00:58:25.106000 audit[5970]: AVC avc: denied { watch } for pid=5970 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_57_20.593248143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c136 tclass=file permissive=0 Sep 13 00:58:25.127546 kernel: audit: type=1400 audit(1757725105.106:1554): avc: denied { watch } for pid=5970 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_57_20.593248143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c136 tclass=file permissive=0 Sep 13 00:58:25.106000 audit[5970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fd2080 a2=fc6 a3=0 items=0 ppid=5905 pid=5970 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 key=(null) Sep 13 00:58:25.106000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:58:25.151538 kernel: audit: type=1300 audit(1757725105.106:1554): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fd2080 a2=fc6 a3=0 items=0 ppid=5905 pid=5970 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 key=(null) Sep 13 00:58:25.151603 kernel: audit: type=1327 audit(1757725105.106:1554): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:58:35.661180 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.Jo1dgH.mount: Deactivated successfully. Sep 13 00:58:46.581043 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.HRagd5.mount: Deactivated successfully. Sep 13 00:58:52.663479 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.li2o7z.mount: Deactivated successfully. Sep 13 00:58:55.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.13:22-10.200.16.10:36634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:58:55.159158 systemd[1]: Started sshd@7-10.200.4.13:22-10.200.16.10:36634.service. Sep 13 00:58:55.178551 kernel: audit: type=1130 audit(1757725135.157:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.13:22-10.200.16.10:36634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:58:55.742000 audit[6480]: USER_ACCT pid=6480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.745459 sshd[6480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:58:55.763345 sshd[6480]: Accepted publickey for core from 10.200.16.10 port 36634 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:58:55.763542 kernel: audit: type=1101 audit(1757725135.742:1556): pid=6480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.743000 audit[6480]: CRED_ACQ pid=6480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.771274 systemd[1]: Started session-10.scope. Sep 13 00:58:55.771926 systemd-logind[1435]: New session 10 of user core. Sep 13 00:58:55.793343 kernel: audit: type=1103 audit(1757725135.743:1557): pid=6480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.793460 kernel: audit: type=1006 audit(1757725135.743:1558): pid=6480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 13 00:58:55.793542 kernel: audit: type=1300 audit(1757725135.743:1558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd79bd26a0 a2=3 a3=0 items=0 ppid=1 pid=6480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:58:55.743000 audit[6480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd79bd26a0 a2=3 a3=0 items=0 ppid=1 pid=6480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:58:55.814551 kernel: audit: type=1327 audit(1757725135.743:1558): proctitle=737368643A20636F7265205B707269765D Sep 13 00:58:55.743000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:58:55.776000 audit[6480]: USER_START pid=6480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.837310 kernel: audit: type=1105 audit(1757725135.776:1559): pid=6480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.781000 audit[6482]: CRED_ACQ pid=6482 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:55.854542 kernel: audit: type=1103 audit(1757725135.781:1560): pid=6482 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:56.272864 sshd[6480]: pam_unix(sshd:session): session closed for user core Sep 13 00:58:56.272000 audit[6480]: USER_END pid=6480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:56.275901 systemd-logind[1435]: Session 10 logged out. Waiting for processes to exit. Sep 13 00:58:56.277145 systemd[1]: sshd@7-10.200.4.13:22-10.200.16.10:36634.service: Deactivated successfully. Sep 13 00:58:56.277915 systemd[1]: session-10.scope: Deactivated successfully. Sep 13 00:58:56.279329 systemd-logind[1435]: Removed session 10. Sep 13 00:58:56.272000 audit[6480]: CRED_DISP pid=6480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:56.309053 kernel: audit: type=1106 audit(1757725136.272:1561): pid=6480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:56.309129 kernel: audit: type=1104 audit(1757725136.272:1562): pid=6480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:58:56.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.13:22-10.200.16.10:36634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:58:59.293000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.293000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000696990 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:59.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:59.294000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.294000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002653ee0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:58:59.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:58:59.415000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7410 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.415000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00940a0f0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:58:59.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:58:59.415000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.415000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007748e80 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:58:59.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:58:59.416000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.416000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00940a1b0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:58:59.416000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:58:59.417000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.417000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00940a7b0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:58:59.417000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:58:59.434000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.434000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006f43f80 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:58:59.434000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:58:59.434000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:58:59.434000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00791ba10 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:58:59.434000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:01.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.13:22-10.200.16.10:57176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:01.372080 systemd[1]: Started sshd@8-10.200.4.13:22-10.200.16.10:57176.service. Sep 13 00:59:01.377234 kernel: kauditd_printk_skb: 25 callbacks suppressed Sep 13 00:59:01.377319 kernel: audit: type=1130 audit(1757725141.370:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.13:22-10.200.16.10:57176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:01.961415 sshd[6493]: Accepted publickey for core from 10.200.16.10 port 57176 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:01.963164 sshd[6493]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:01.959000 audit[6493]: USER_ACCT pid=6493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:01.982535 kernel: audit: type=1101 audit(1757725141.959:1573): pid=6493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:01.987448 systemd-logind[1435]: New session 11 of user core. Sep 13 00:59:01.988130 systemd[1]: Started session-11.scope. Sep 13 00:59:01.961000 audit[6493]: CRED_ACQ pid=6493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.015542 kernel: audit: type=1103 audit(1757725141.961:1574): pid=6493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.036534 kernel: audit: type=1006 audit(1757725141.961:1575): pid=6493 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Sep 13 00:59:01.961000 audit[6493]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03350c90 a2=3 a3=0 items=0 ppid=1 pid=6493 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:01.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:02.065136 kernel: audit: type=1300 audit(1757725141.961:1575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03350c90 a2=3 a3=0 items=0 ppid=1 pid=6493 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:02.065250 kernel: audit: type=1327 audit(1757725141.961:1575): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:02.065283 kernel: audit: type=1105 audit(1757725141.992:1576): pid=6493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:01.992000 audit[6493]: USER_START pid=6493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:01.994000 audit[6495]: CRED_ACQ pid=6495 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.106308 kernel: audit: type=1103 audit(1757725141.994:1577): pid=6495 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.488696 sshd[6493]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:02.488000 audit[6493]: USER_END pid=6493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.491429 systemd[1]: sshd@8-10.200.4.13:22-10.200.16.10:57176.service: Deactivated successfully. Sep 13 00:59:02.492815 systemd[1]: session-11.scope: Deactivated successfully. Sep 13 00:59:02.493554 systemd-logind[1435]: Session 11 logged out. Waiting for processes to exit. Sep 13 00:59:02.494335 systemd-logind[1435]: Removed session 11. Sep 13 00:59:02.488000 audit[6493]: CRED_DISP pid=6493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.526592 kernel: audit: type=1106 audit(1757725142.488:1578): pid=6493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.526682 kernel: audit: type=1104 audit(1757725142.488:1579): pid=6493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:02.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.13:22-10.200.16.10:57176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:05.166000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cfd300 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:05.166000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ce0ac0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:05.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:05.167000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:05.167000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ce0c60 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:05.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:05.167000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:05.167000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cfd620 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:05.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:07.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.13:22-10.200.16.10:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:07.587860 systemd[1]: Started sshd@9-10.200.4.13:22-10.200.16.10:57190.service. Sep 13 00:59:07.593130 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:59:07.593216 kernel: audit: type=1130 audit(1757725147.586:1585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.13:22-10.200.16.10:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:08.177000 audit[6548]: USER_ACCT pid=6548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.179431 sshd[6548]: Accepted publickey for core from 10.200.16.10 port 57190 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:08.181629 sshd[6548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:08.179000 audit[6548]: CRED_ACQ pid=6548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.204448 systemd[1]: Started session-12.scope. Sep 13 00:59:08.205642 systemd-logind[1435]: New session 12 of user core. Sep 13 00:59:08.216817 kernel: audit: type=1101 audit(1757725148.177:1586): pid=6548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.216913 kernel: audit: type=1103 audit(1757725148.179:1587): pid=6548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.217972 kernel: audit: type=1006 audit(1757725148.179:1588): pid=6548 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 13 00:59:08.179000 audit[6548]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9829310 a2=3 a3=0 items=0 ppid=1 pid=6548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:08.228534 kernel: audit: type=1300 audit(1757725148.179:1588): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9829310 a2=3 a3=0 items=0 ppid=1 pid=6548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:08.179000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:08.246543 kernel: audit: type=1327 audit(1757725148.179:1588): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:08.214000 audit[6548]: USER_START pid=6548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.271854 kernel: audit: type=1105 audit(1757725148.214:1589): pid=6548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.271961 kernel: audit: type=1103 audit(1757725148.215:1590): pid=6550 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.215000 audit[6550]: CRED_ACQ pid=6550 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.668685 sshd[6548]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:08.668000 audit[6548]: USER_END pid=6548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.671788 systemd[1]: sshd@9-10.200.4.13:22-10.200.16.10:57190.service: Deactivated successfully. Sep 13 00:59:08.672587 systemd[1]: session-12.scope: Deactivated successfully. Sep 13 00:59:08.674154 systemd-logind[1435]: Session 12 logged out. Waiting for processes to exit. Sep 13 00:59:08.675134 systemd-logind[1435]: Removed session 12. Sep 13 00:59:08.668000 audit[6548]: CRED_DISP pid=6548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.704437 kernel: audit: type=1106 audit(1757725148.668:1591): pid=6548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.704546 kernel: audit: type=1104 audit(1757725148.668:1592): pid=6548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:08.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.13:22-10.200.16.10:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:12.698842 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.Eeev7O.mount: Deactivated successfully. Sep 13 00:59:13.658000 audit[5692]: AVC avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 00:59:13.665594 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:59:13.665707 kernel: audit: type=1400 audit(1757725153.658:1594): avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 00:59:13.658000 audit[5692]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001628180 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 00:59:13.707161 kernel: audit: type=1300 audit(1757725153.658:1594): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001628180 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 00:59:13.707276 kernel: audit: type=1327 audit(1757725153.658:1594): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:59:13.658000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:59:13.766610 systemd[1]: Started sshd@10-10.200.4.13:22-10.200.16.10:39902.service. Sep 13 00:59:13.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.13:22-10.200.16.10:39902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:13.786582 kernel: audit: type=1130 audit(1757725153.765:1595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.13:22-10.200.16.10:39902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:14.349000 audit[6582]: USER_ACCT pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.370255 sshd[6582]: Accepted publickey for core from 10.200.16.10 port 39902 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:14.370581 kernel: audit: type=1101 audit(1757725154.349:1596): pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.372333 sshd[6582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:14.370000 audit[6582]: CRED_ACQ pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.383566 systemd[1]: Started session-13.scope. Sep 13 00:59:14.384758 systemd-logind[1435]: New session 13 of user core. Sep 13 00:59:14.392649 kernel: audit: type=1103 audit(1757725154.370:1597): pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.370000 audit[6582]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefda5cee0 a2=3 a3=0 items=0 ppid=1 pid=6582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:14.404649 kernel: audit: type=1006 audit(1757725154.370:1598): pid=6582 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Sep 13 00:59:14.404687 kernel: audit: type=1300 audit(1757725154.370:1598): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefda5cee0 a2=3 a3=0 items=0 ppid=1 pid=6582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:14.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:14.422567 kernel: audit: type=1327 audit(1757725154.370:1598): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:14.427654 kernel: audit: type=1105 audit(1757725154.389:1599): pid=6582 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.389000 audit[6582]: USER_START pid=6582 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.397000 audit[6585]: CRED_ACQ pid=6585 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.823442 sshd[6582]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:14.823000 audit[6582]: USER_END pid=6582 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.823000 audit[6582]: CRED_DISP pid=6582 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:14.826193 systemd[1]: sshd@10-10.200.4.13:22-10.200.16.10:39902.service: Deactivated successfully. Sep 13 00:59:14.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.13:22-10.200.16.10:39902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:14.827051 systemd[1]: session-13.scope: Deactivated successfully. Sep 13 00:59:14.827718 systemd-logind[1435]: Session 13 logged out. Waiting for processes to exit. Sep 13 00:59:14.828550 systemd-logind[1435]: Removed session 13. Sep 13 00:59:14.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.13:22-10.200.16.10:39906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:14.925427 systemd[1]: Started sshd@11-10.200.4.13:22-10.200.16.10:39906.service. Sep 13 00:59:15.512000 audit[6597]: USER_ACCT pid=6597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:15.515175 sshd[6597]: Accepted publickey for core from 10.200.16.10 port 39906 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:15.513000 audit[6597]: CRED_ACQ pid=6597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:15.513000 audit[6597]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa7e29e10 a2=3 a3=0 items=0 ppid=1 pid=6597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:15.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:15.515834 sshd[6597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:15.520949 systemd[1]: Started session-14.scope. Sep 13 00:59:15.521404 systemd-logind[1435]: New session 14 of user core. Sep 13 00:59:15.524000 audit[6597]: USER_START pid=6597 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:15.525000 audit[6599]: CRED_ACQ pid=6599 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:16.026273 sshd[6597]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:16.026000 audit[6597]: USER_END pid=6597 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:16.026000 audit[6597]: CRED_DISP pid=6597 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:16.029128 systemd[1]: sshd@11-10.200.4.13:22-10.200.16.10:39906.service: Deactivated successfully. Sep 13 00:59:16.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.13:22-10.200.16.10:39906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:16.030016 systemd[1]: session-14.scope: Deactivated successfully. Sep 13 00:59:16.030763 systemd-logind[1435]: Session 14 logged out. Waiting for processes to exit. Sep 13 00:59:16.031607 systemd-logind[1435]: Removed session 14. Sep 13 00:59:16.124000 systemd[1]: Started sshd@12-10.200.4.13:22-10.200.16.10:39912.service. Sep 13 00:59:16.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.13:22-10.200.16.10:39912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:16.579593 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.ipA7QN.mount: Deactivated successfully. Sep 13 00:59:16.705000 audit[6606]: USER_ACCT pid=6606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:16.707148 sshd[6606]: Accepted publickey for core from 10.200.16.10 port 39912 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:16.706000 audit[6606]: CRED_ACQ pid=6606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:16.706000 audit[6606]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc304faa20 a2=3 a3=0 items=0 ppid=1 pid=6606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:16.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:16.708479 sshd[6606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:16.713176 systemd[1]: Started session-15.scope. Sep 13 00:59:16.713801 systemd-logind[1435]: New session 15 of user core. Sep 13 00:59:16.717000 audit[6606]: USER_START pid=6606 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:16.719000 audit[6628]: CRED_ACQ pid=6628 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:17.336689 sshd[6606]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:17.336000 audit[6606]: USER_END pid=6606 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:17.336000 audit[6606]: CRED_DISP pid=6606 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:17.339402 systemd[1]: sshd@12-10.200.4.13:22-10.200.16.10:39912.service: Deactivated successfully. Sep 13 00:59:17.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.13:22-10.200.16.10:39912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:17.340355 systemd[1]: session-15.scope: Deactivated successfully. Sep 13 00:59:17.341160 systemd-logind[1435]: Session 15 logged out. Waiting for processes to exit. Sep 13 00:59:17.342023 systemd-logind[1435]: Removed session 15. Sep 13 00:59:22.460548 kernel: kauditd_printk_skb: 26 callbacks suppressed Sep 13 00:59:22.460671 kernel: audit: type=1130 audit(1757725162.436:1622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.13:22-10.200.16.10:33832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:22.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.13:22-10.200.16.10:33832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:22.437605 systemd[1]: Started sshd@13-10.200.4.13:22-10.200.16.10:33832.service. Sep 13 00:59:23.026000 audit[6642]: USER_ACCT pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.027775 sshd[6642]: Accepted publickey for core from 10.200.16.10 port 33832 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:23.045000 audit[6642]: CRED_ACQ pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.048070 sshd[6642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:23.053773 systemd[1]: Started session-16.scope. Sep 13 00:59:23.054794 systemd-logind[1435]: New session 16 of user core. Sep 13 00:59:23.066368 kernel: audit: type=1101 audit(1757725163.026:1623): pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.066478 kernel: audit: type=1103 audit(1757725163.045:1624): pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.066570 kernel: audit: type=1006 audit(1757725163.046:1625): pid=6642 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Sep 13 00:59:23.046000 audit[6642]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd74852b0 a2=3 a3=0 items=0 ppid=1 pid=6642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:23.095570 kernel: audit: type=1300 audit(1757725163.046:1625): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd74852b0 a2=3 a3=0 items=0 ppid=1 pid=6642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:23.101994 kernel: audit: type=1327 audit(1757725163.046:1625): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:23.046000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:23.059000 audit[6642]: USER_START pid=6642 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.121096 kernel: audit: type=1105 audit(1757725163.059:1626): pid=6642 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.061000 audit[6644]: CRED_ACQ pid=6644 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.138208 kernel: audit: type=1103 audit(1757725163.061:1627): pid=6644 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.512098 sshd[6642]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:23.511000 audit[6642]: USER_END pid=6642 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.522929 systemd[1]: sshd@13-10.200.4.13:22-10.200.16.10:33832.service: Deactivated successfully. Sep 13 00:59:23.523768 systemd[1]: session-16.scope: Deactivated successfully. Sep 13 00:59:23.525251 systemd-logind[1435]: Session 16 logged out. Waiting for processes to exit. Sep 13 00:59:23.526176 systemd-logind[1435]: Removed session 16. Sep 13 00:59:23.511000 audit[6642]: CRED_DISP pid=6642 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.549409 kernel: audit: type=1106 audit(1757725163.511:1628): pid=6642 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.549535 kernel: audit: type=1104 audit(1757725163.511:1629): pid=6642 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:23.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.13:22-10.200.16.10:33832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:25.106000 audit[5970]: AVC avc: denied { watch } for pid=5970 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_57_20.593248143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c136 tclass=file permissive=0 Sep 13 00:59:25.106000 audit[5970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fd22c0 a2=fc6 a3=0 items=0 ppid=5905 pid=5970 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 key=(null) Sep 13 00:59:25.106000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:59:28.637873 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:59:28.637999 kernel: audit: type=1130 audit(1757725168.615:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.13:22-10.200.16.10:33842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:28.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.13:22-10.200.16.10:33842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:28.616633 systemd[1]: Started sshd@14-10.200.4.13:22-10.200.16.10:33842.service. Sep 13 00:59:29.238579 sshd[6663]: Accepted publickey for core from 10.200.16.10 port 33842 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:29.236000 audit[6663]: USER_ACCT pid=6663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.240059 sshd[6663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:29.260038 kernel: audit: type=1101 audit(1757725169.236:1633): pid=6663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.238000 audit[6663]: CRED_ACQ pid=6663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.279603 kernel: audit: type=1103 audit(1757725169.238:1634): pid=6663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.287662 systemd[1]: Started session-17.scope. Sep 13 00:59:29.291830 systemd-logind[1435]: New session 17 of user core. Sep 13 00:59:29.292596 kernel: audit: type=1006 audit(1757725169.238:1635): pid=6663 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 13 00:59:29.238000 audit[6663]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe207a48d0 a2=3 a3=0 items=0 ppid=1 pid=6663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:29.312856 kernel: audit: type=1300 audit(1757725169.238:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe207a48d0 a2=3 a3=0 items=0 ppid=1 pid=6663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:29.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:29.322532 kernel: audit: type=1327 audit(1757725169.238:1635): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:29.307000 audit[6663]: USER_START pid=6663 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.311000 audit[6665]: CRED_ACQ pid=6665 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.359979 kernel: audit: type=1105 audit(1757725169.307:1636): pid=6663 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.360102 kernel: audit: type=1103 audit(1757725169.311:1637): pid=6665 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.790010 sshd[6663]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:29.789000 audit[6663]: USER_END pid=6663 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.793083 systemd-logind[1435]: Session 17 logged out. Waiting for processes to exit. Sep 13 00:59:29.794402 systemd[1]: sshd@14-10.200.4.13:22-10.200.16.10:33842.service: Deactivated successfully. Sep 13 00:59:29.795127 systemd[1]: session-17.scope: Deactivated successfully. Sep 13 00:59:29.796562 systemd-logind[1435]: Removed session 17. Sep 13 00:59:29.813542 kernel: audit: type=1106 audit(1757725169.789:1638): pid=6663 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.813640 kernel: audit: type=1104 audit(1757725169.789:1639): pid=6663 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.789000 audit[6663]: CRED_DISP pid=6663 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:29.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.13:22-10.200.16.10:33842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:34.887036 systemd[1]: Started sshd@15-10.200.4.13:22-10.200.16.10:49916.service. Sep 13 00:59:34.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.13:22-10.200.16.10:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:34.893600 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:59:34.893662 kernel: audit: type=1130 audit(1757725174.886:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.13:22-10.200.16.10:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:35.470000 audit[6676]: USER_ACCT pid=6676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.471807 sshd[6676]: Accepted publickey for core from 10.200.16.10 port 49916 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:35.490556 kernel: audit: type=1101 audit(1757725175.470:1642): pid=6676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.489000 audit[6676]: CRED_ACQ pid=6676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.491219 sshd[6676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:35.496838 systemd[1]: Started session-18.scope. Sep 13 00:59:35.501403 systemd-logind[1435]: New session 18 of user core. Sep 13 00:59:35.511386 kernel: audit: type=1103 audit(1757725175.489:1643): pid=6676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.511468 kernel: audit: type=1006 audit(1757725175.489:1644): pid=6676 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Sep 13 00:59:35.489000 audit[6676]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe555af3d0 a2=3 a3=0 items=0 ppid=1 pid=6676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:35.522542 kernel: audit: type=1300 audit(1757725175.489:1644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe555af3d0 a2=3 a3=0 items=0 ppid=1 pid=6676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:35.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:35.508000 audit[6676]: USER_START pid=6676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.545608 kernel: audit: type=1327 audit(1757725175.489:1644): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:35.545642 kernel: audit: type=1105 audit(1757725175.508:1645): pid=6676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.511000 audit[6678]: CRED_ACQ pid=6678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.580848 kernel: audit: type=1103 audit(1757725175.511:1646): pid=6678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.656075 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.mrsTGB.mount: Deactivated successfully. Sep 13 00:59:35.954639 sshd[6676]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:35.954000 audit[6676]: USER_END pid=6676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.957670 systemd-logind[1435]: Session 18 logged out. Waiting for processes to exit. Sep 13 00:59:35.959194 systemd[1]: sshd@15-10.200.4.13:22-10.200.16.10:49916.service: Deactivated successfully. Sep 13 00:59:35.959914 systemd[1]: session-18.scope: Deactivated successfully. Sep 13 00:59:35.961751 systemd-logind[1435]: Removed session 18. Sep 13 00:59:35.979564 kernel: audit: type=1106 audit(1757725175.954:1647): pid=6676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.954000 audit[6676]: CRED_DISP pid=6676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:35.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.13:22-10.200.16.10:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:35.996556 kernel: audit: type=1104 audit(1757725175.954:1648): pid=6676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:36.052437 systemd[1]: Started sshd@16-10.200.4.13:22-10.200.16.10:49918.service. Sep 13 00:59:36.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.13:22-10.200.16.10:49918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:36.633000 audit[6709]: USER_ACCT pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:36.635364 sshd[6709]: Accepted publickey for core from 10.200.16.10 port 49918 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:36.634000 audit[6709]: CRED_ACQ pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:36.636683 sshd[6709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:36.634000 audit[6709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe23e7a540 a2=3 a3=0 items=0 ppid=1 pid=6709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:36.634000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:36.641455 systemd-logind[1435]: New session 19 of user core. Sep 13 00:59:36.641975 systemd[1]: Started session-19.scope. Sep 13 00:59:36.645000 audit[6709]: USER_START pid=6709 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:36.646000 audit[6711]: CRED_ACQ pid=6711 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:37.128458 sshd[6709]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:37.128000 audit[6709]: USER_END pid=6709 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:37.128000 audit[6709]: CRED_DISP pid=6709 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:37.131200 systemd[1]: sshd@16-10.200.4.13:22-10.200.16.10:49918.service: Deactivated successfully. Sep 13 00:59:37.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.13:22-10.200.16.10:49918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:37.132088 systemd[1]: session-19.scope: Deactivated successfully. Sep 13 00:59:37.132816 systemd-logind[1435]: Session 19 logged out. Waiting for processes to exit. Sep 13 00:59:37.133603 systemd-logind[1435]: Removed session 19. Sep 13 00:59:37.227271 systemd[1]: Started sshd@17-10.200.4.13:22-10.200.16.10:49932.service. Sep 13 00:59:37.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.13:22-10.200.16.10:49932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:37.812000 audit[6719]: USER_ACCT pid=6719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:37.814697 sshd[6719]: Accepted publickey for core from 10.200.16.10 port 49932 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:37.814000 audit[6719]: CRED_ACQ pid=6719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:37.814000 audit[6719]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6aafb460 a2=3 a3=0 items=0 ppid=1 pid=6719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:37.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:37.816084 sshd[6719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:37.820810 systemd-logind[1435]: New session 20 of user core. Sep 13 00:59:37.821416 systemd[1]: Started session-20.scope. Sep 13 00:59:37.824000 audit[6719]: USER_START pid=6719 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:37.826000 audit[6721]: CRED_ACQ pid=6721 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:38.655000 audit[6731]: NETFILTER_CFG table=filter:157 family=2 entries=20 op=nft_register_rule pid=6731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:38.655000 audit[6731]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdfb1d71b0 a2=0 a3=7ffdfb1d719c items=0 ppid=2597 pid=6731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:38.655000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:38.661000 audit[6731]: NETFILTER_CFG table=nat:158 family=2 entries=26 op=nft_register_rule pid=6731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:38.661000 audit[6731]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffdfb1d71b0 a2=0 a3=0 items=0 ppid=2597 pid=6731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:38.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:38.680000 audit[6733]: NETFILTER_CFG table=filter:159 family=2 entries=32 op=nft_register_rule pid=6733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:38.680000 audit[6733]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc29200860 a2=0 a3=7ffc2920084c items=0 ppid=2597 pid=6733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:38.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:38.688000 audit[6733]: NETFILTER_CFG table=nat:160 family=2 entries=26 op=nft_register_rule pid=6733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:38.688000 audit[6733]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc29200860 a2=0 a3=0 items=0 ppid=2597 pid=6733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:38.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:38.751823 sshd[6719]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:38.751000 audit[6719]: USER_END pid=6719 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:38.751000 audit[6719]: CRED_DISP pid=6719 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:38.754536 systemd[1]: sshd@17-10.200.4.13:22-10.200.16.10:49932.service: Deactivated successfully. Sep 13 00:59:38.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.13:22-10.200.16.10:49932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:38.755686 systemd[1]: session-20.scope: Deactivated successfully. Sep 13 00:59:38.756059 systemd-logind[1435]: Session 20 logged out. Waiting for processes to exit. Sep 13 00:59:38.756903 systemd-logind[1435]: Removed session 20. Sep 13 00:59:38.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.13:22-10.200.16.10:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:38.850630 systemd[1]: Started sshd@18-10.200.4.13:22-10.200.16.10:49944.service. Sep 13 00:59:39.439000 audit[6736]: USER_ACCT pid=6736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:39.441135 sshd[6736]: Accepted publickey for core from 10.200.16.10 port 49944 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:39.440000 audit[6736]: CRED_ACQ pid=6736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:39.440000 audit[6736]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcc18b920 a2=3 a3=0 items=0 ppid=1 pid=6736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:39.440000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:39.442449 sshd[6736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:39.447185 systemd[1]: Started session-21.scope. Sep 13 00:59:39.447767 systemd-logind[1435]: New session 21 of user core. Sep 13 00:59:39.450000 audit[6736]: USER_START pid=6736 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:39.452000 audit[6738]: CRED_ACQ pid=6738 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.024486 sshd[6736]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:40.031790 kernel: kauditd_printk_skb: 43 callbacks suppressed Sep 13 00:59:40.031898 kernel: audit: type=1106 audit(1757725180.024:1678): pid=6736 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.024000 audit[6736]: USER_END pid=6736 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.030636 systemd[1]: sshd@18-10.200.4.13:22-10.200.16.10:49944.service: Deactivated successfully. Sep 13 00:59:40.031391 systemd[1]: session-21.scope: Deactivated successfully. Sep 13 00:59:40.033216 systemd-logind[1435]: Session 21 logged out. Waiting for processes to exit. Sep 13 00:59:40.034199 systemd-logind[1435]: Removed session 21. Sep 13 00:59:40.051547 kernel: audit: type=1104 audit(1757725180.024:1679): pid=6736 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.024000 audit[6736]: CRED_DISP pid=6736 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.13:22-10.200.16.10:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:40.082456 kernel: audit: type=1131 audit(1757725180.029:1680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.13:22-10.200.16.10:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:40.122020 systemd[1]: Started sshd@19-10.200.4.13:22-10.200.16.10:59362.service. Sep 13 00:59:40.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.13:22-10.200.16.10:59362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:40.140548 kernel: audit: type=1130 audit(1757725180.120:1681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.13:22-10.200.16.10:59362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:40.961000 audit[6747]: USER_ACCT pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.965086 sshd[6747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:40.983160 sshd[6747]: Accepted publickey for core from 10.200.16.10 port 59362 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:40.983557 kernel: audit: type=1101 audit(1757725180.961:1682): pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.963000 audit[6747]: CRED_ACQ pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:40.994159 systemd[1]: Started session-22.scope. Sep 13 00:59:40.995860 systemd-logind[1435]: New session 22 of user core. Sep 13 00:59:41.006489 kernel: audit: type=1103 audit(1757725180.963:1683): pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:41.006594 kernel: audit: type=1006 audit(1757725180.963:1684): pid=6747 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Sep 13 00:59:40.963000 audit[6747]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa99e91a0 a2=3 a3=0 items=0 ppid=1 pid=6747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:41.014533 kernel: audit: type=1300 audit(1757725180.963:1684): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa99e91a0 a2=3 a3=0 items=0 ppid=1 pid=6747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:40.963000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:41.032555 kernel: audit: type=1327 audit(1757725180.963:1684): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:41.001000 audit[6747]: USER_START pid=6747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:41.038534 kernel: audit: type=1105 audit(1757725181.001:1685): pid=6747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:41.001000 audit[6749]: CRED_ACQ pid=6749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:41.446743 sshd[6747]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:41.446000 audit[6747]: USER_END pid=6747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:41.446000 audit[6747]: CRED_DISP pid=6747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:41.449475 systemd[1]: sshd@19-10.200.4.13:22-10.200.16.10:59362.service: Deactivated successfully. Sep 13 00:59:41.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.13:22-10.200.16.10:59362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:41.450408 systemd[1]: session-22.scope: Deactivated successfully. Sep 13 00:59:41.451159 systemd-logind[1435]: Session 22 logged out. Waiting for processes to exit. Sep 13 00:59:41.451980 systemd-logind[1435]: Removed session 22. Sep 13 00:59:42.684507 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.ZKMKMu.mount: Deactivated successfully. Sep 13 00:59:46.545584 systemd[1]: Started sshd@20-10.200.4.13:22-10.200.16.10:59378.service. Sep 13 00:59:46.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.13:22-10.200.16.10:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:46.550403 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:59:46.550493 kernel: audit: type=1130 audit(1757725186.544:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.13:22-10.200.16.10:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:46.590393 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.17rcIA.mount: Deactivated successfully. Sep 13 00:59:46.814000 audit[6800]: NETFILTER_CFG table=filter:161 family=2 entries=20 op=nft_register_rule pid=6800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:46.814000 audit[6800]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc7310f20 a2=0 a3=7fffc7310f0c items=0 ppid=2597 pid=6800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:46.847608 kernel: audit: type=1325 audit(1757725186.814:1691): table=filter:161 family=2 entries=20 op=nft_register_rule pid=6800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:46.847684 kernel: audit: type=1300 audit(1757725186.814:1691): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc7310f20 a2=0 a3=7fffc7310f0c items=0 ppid=2597 pid=6800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:46.814000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:46.857772 kernel: audit: type=1327 audit(1757725186.814:1691): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:46.857885 kernel: audit: type=1325 audit(1757725186.846:1692): table=nat:162 family=2 entries=110 op=nft_register_chain pid=6800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:46.846000 audit[6800]: NETFILTER_CFG table=nat:162 family=2 entries=110 op=nft_register_chain pid=6800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:59:46.846000 audit[6800]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fffc7310f20 a2=0 a3=7fffc7310f0c items=0 ppid=2597 pid=6800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:46.888433 kernel: audit: type=1300 audit(1757725186.846:1692): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fffc7310f20 a2=0 a3=7fffc7310f0c items=0 ppid=2597 pid=6800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:46.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:46.902167 kernel: audit: type=1327 audit(1757725186.846:1692): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:59:47.143000 audit[6777]: USER_ACCT pid=6777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.146646 sshd[6777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:47.164080 sshd[6777]: Accepted publickey for core from 10.200.16.10 port 59378 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:47.164868 kernel: audit: type=1101 audit(1757725187.143:1693): pid=6777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.144000 audit[6777]: CRED_ACQ pid=6777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.169013 systemd[1]: Started session-23.scope. Sep 13 00:59:47.170041 systemd-logind[1435]: New session 23 of user core. Sep 13 00:59:47.183561 kernel: audit: type=1103 audit(1757725187.144:1694): pid=6777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.144000 audit[6777]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb6a96300 a2=3 a3=0 items=0 ppid=1 pid=6777 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:47.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:47.174000 audit[6777]: USER_START pid=6777 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.185000 audit[6801]: CRED_ACQ pid=6801 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.195724 kernel: audit: type=1006 audit(1757725187.144:1695): pid=6777 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Sep 13 00:59:47.623336 sshd[6777]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:47.623000 audit[6777]: USER_END pid=6777 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.623000 audit[6777]: CRED_DISP pid=6777 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:47.626242 systemd[1]: sshd@20-10.200.4.13:22-10.200.16.10:59378.service: Deactivated successfully. Sep 13 00:59:47.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.13:22-10.200.16.10:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:47.627080 systemd[1]: session-23.scope: Deactivated successfully. Sep 13 00:59:47.627768 systemd-logind[1435]: Session 23 logged out. Waiting for processes to exit. Sep 13 00:59:47.628501 systemd-logind[1435]: Removed session 23. Sep 13 00:59:52.673805 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.3gUmLe.mount: Deactivated successfully. Sep 13 00:59:52.740789 systemd[1]: Started sshd@21-10.200.4.13:22-10.200.16.10:33942.service. Sep 13 00:59:52.763672 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 13 00:59:52.763788 kernel: audit: type=1130 audit(1757725192.739:1701): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.13:22-10.200.16.10:33942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:52.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.13:22-10.200.16.10:33942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:53.334078 sshd[6831]: Accepted publickey for core from 10.200.16.10 port 33942 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:53.335784 sshd[6831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:53.332000 audit[6831]: USER_ACCT pid=6831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.333000 audit[6831]: CRED_ACQ pid=6831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.358586 systemd-logind[1435]: New session 24 of user core. Sep 13 00:59:53.359170 systemd[1]: Started session-24.scope. Sep 13 00:59:53.374973 kernel: audit: type=1101 audit(1757725193.332:1702): pid=6831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.375096 kernel: audit: type=1103 audit(1757725193.333:1703): pid=6831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.389682 kernel: audit: type=1006 audit(1757725193.333:1704): pid=6831 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Sep 13 00:59:53.333000 audit[6831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff90a50350 a2=3 a3=0 items=0 ppid=1 pid=6831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:53.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:53.413816 kernel: audit: type=1300 audit(1757725193.333:1704): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff90a50350 a2=3 a3=0 items=0 ppid=1 pid=6831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:53.413900 kernel: audit: type=1327 audit(1757725193.333:1704): proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:53.414738 kernel: audit: type=1105 audit(1757725193.374:1705): pid=6831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.374000 audit[6831]: USER_START pid=6831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.388000 audit[6833]: CRED_ACQ pid=6833 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.454552 kernel: audit: type=1103 audit(1757725193.388:1706): pid=6833 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.883361 sshd[6831]: pam_unix(sshd:session): session closed for user core Sep 13 00:59:53.883000 audit[6831]: USER_END pid=6831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.886550 systemd-logind[1435]: Session 24 logged out. Waiting for processes to exit. Sep 13 00:59:53.887840 systemd[1]: sshd@21-10.200.4.13:22-10.200.16.10:33942.service: Deactivated successfully. Sep 13 00:59:53.888558 systemd[1]: session-24.scope: Deactivated successfully. Sep 13 00:59:53.889933 systemd-logind[1435]: Removed session 24. Sep 13 00:59:53.906538 kernel: audit: type=1106 audit(1757725193.883:1707): pid=6831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.883000 audit[6831]: CRED_DISP pid=6831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.930548 kernel: audit: type=1104 audit(1757725193.883:1708): pid=6831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:53.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.13:22-10.200.16.10:33942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:58.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.13:22-10.200.16.10:33958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:58.980400 systemd[1]: Started sshd@22-10.200.4.13:22-10.200.16.10:33958.service. Sep 13 00:59:58.985368 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:59:58.985462 kernel: audit: type=1130 audit(1757725198.979:1710): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.13:22-10.200.16.10:33958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:59:59.295000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.313570 kernel: audit: type=1400 audit(1757725199.295:1712): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.295000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.295000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb5f80 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:59.330569 kernel: audit: type=1400 audit(1757725199.295:1711): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.330625 kernel: audit: type=1300 audit(1757725199.295:1712): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb5f80 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:59.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:59.352541 kernel: audit: type=1327 audit(1757725199.295:1712): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:59.372154 kernel: audit: type=1300 audit(1757725199.295:1711): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b06fc0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:59.295000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b06fc0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 00:59:59.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:59.393557 kernel: audit: type=1327 audit(1757725199.295:1711): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:59:59.417000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.438536 kernel: audit: type=1400 audit(1757725199.417:1713): avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.417000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c009038150 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.462550 kernel: audit: type=1300 audit(1757725199.417:1713): arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c009038150 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.417000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.485628 kernel: audit: type=1327 audit(1757725199.417:1713): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.417000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7410 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.417000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c009038180 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.417000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.417000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.417000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c009b096e0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.417000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.417000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.417000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0090381b0 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.417000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.442000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7408 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.442000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c008223530 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.442000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.442000 audit[2364]: AVC avc: denied { watch } for pid=2364 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:59:59.442000 audit[2364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c005796a00 a2=fc6 a3=0 items=0 ppid=2224 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c942 key=(null) Sep 13 00:59:59.442000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:59:59.589391 sshd[6842]: Accepted publickey for core from 10.200.16.10 port 33958 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:59:59.587000 audit[6842]: USER_ACCT pid=6842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:59.590000 audit[6842]: CRED_ACQ pid=6842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:59.590000 audit[6842]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcba6c3e70 a2=3 a3=0 items=0 ppid=1 pid=6842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:59:59.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:59:59.592993 sshd[6842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:59:59.599821 systemd-logind[1435]: New session 25 of user core. Sep 13 00:59:59.600481 systemd[1]: Started session-25.scope. Sep 13 00:59:59.606000 audit[6842]: USER_START pid=6842 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:59:59.608000 audit[6844]: CRED_ACQ pid=6844 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:00.126334 sshd[6842]: pam_unix(sshd:session): session closed for user core Sep 13 01:00:00.125000 audit[6842]: USER_END pid=6842 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:00.126000 audit[6842]: CRED_DISP pid=6842 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:00.129433 systemd-logind[1435]: Session 25 logged out. Waiting for processes to exit. Sep 13 01:00:00.129878 systemd[1]: sshd@22-10.200.4.13:22-10.200.16.10:33958.service: Deactivated successfully. Sep 13 01:00:00.130802 systemd[1]: session-25.scope: Deactivated successfully. Sep 13 01:00:00.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.13:22-10.200.16.10:33958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:00.132271 systemd-logind[1435]: Removed session 25. Sep 13 01:00:05.168000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.174257 kernel: kauditd_printk_skb: 25 callbacks suppressed Sep 13 01:00:05.174360 kernel: audit: type=1400 audit(1757725205.168:1727): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.193536 kernel: audit: type=1400 audit(1757725205.168:1728): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.168000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.168000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b07720 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.236916 kernel: audit: type=1300 audit(1757725205.168:1728): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b07720 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.258056 kernel: audit: type=1327 audit(1757725205.168:1728): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.242328 systemd[1]: Started sshd@23-10.200.4.13:22-10.200.16.10:58540.service. Sep 13 01:00:05.168000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.168000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b078c0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.275582 kernel: audit: type=1400 audit(1757725205.168:1729): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.275626 kernel: audit: type=1300 audit(1757725205.168:1729): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b078c0 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.295536 kernel: audit: type=1327 audit(1757725205.168:1729): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.168000 audit[2314]: AVC avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.327442 kernel: audit: type=1400 audit(1757725205.168:1730): avc: denied { watch } for pid=2314 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 01:00:05.327600 kernel: audit: type=1300 audit(1757725205.168:1730): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002338280 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.168000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002338280 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.351591 kernel: audit: type=1327 audit(1757725205.168:1730): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.168000 audit[2314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cd0860 a2=fc6 a3=0 items=0 ppid=2176 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c178 key=(null) Sep 13 01:00:05.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 01:00:05.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.13:22-10.200.16.10:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:05.387224 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.DXRkPM.mount: Deactivated successfully. Sep 13 01:00:05.666287 systemd[1]: run-containerd-runc-k8s.io-5a34c0e35c58fc6f64da100753abbabef1ff0a1b18cb799d0d06d501747d174a-runc.i1qLVf.mount: Deactivated successfully. Sep 13 01:00:05.836000 audit[6877]: USER_ACCT pid=6877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:05.838053 sshd[6877]: Accepted publickey for core from 10.200.16.10 port 58540 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 01:00:05.837000 audit[6877]: CRED_ACQ pid=6877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:05.837000 audit[6877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc2da2d90 a2=3 a3=0 items=0 ppid=1 pid=6877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:05.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:05.839436 sshd[6877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:00:05.844135 systemd[1]: Started session-26.scope. Sep 13 01:00:05.844569 systemd-logind[1435]: New session 26 of user core. Sep 13 01:00:05.847000 audit[6877]: USER_START pid=6877 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:05.849000 audit[6922]: CRED_ACQ pid=6922 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:06.318875 sshd[6877]: pam_unix(sshd:session): session closed for user core Sep 13 01:00:06.318000 audit[6877]: USER_END pid=6877 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:06.318000 audit[6877]: CRED_DISP pid=6877 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:06.321801 systemd[1]: sshd@23-10.200.4.13:22-10.200.16.10:58540.service: Deactivated successfully. Sep 13 01:00:06.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.13:22-10.200.16.10:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:06.322715 systemd[1]: session-26.scope: Deactivated successfully. Sep 13 01:00:06.323360 systemd-logind[1435]: Session 26 logged out. Waiting for processes to exit. Sep 13 01:00:06.324201 systemd-logind[1435]: Removed session 26. Sep 13 01:00:11.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.13:22-10.200.16.10:35606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:11.423343 systemd[1]: Started sshd@24-10.200.4.13:22-10.200.16.10:35606.service. Sep 13 01:00:11.446332 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 01:00:11.446440 kernel: audit: type=1130 audit(1757725211.422:1740): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.13:22-10.200.16.10:35606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:12.011000 audit[6935]: USER_ACCT pid=6935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.015075 sshd[6935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:00:12.032678 kernel: audit: type=1101 audit(1757725212.011:1741): pid=6935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.032717 sshd[6935]: Accepted publickey for core from 10.200.16.10 port 35606 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 01:00:12.013000 audit[6935]: CRED_ACQ pid=6935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.038246 systemd[1]: Started session-27.scope. Sep 13 01:00:12.039315 systemd-logind[1435]: New session 27 of user core. Sep 13 01:00:12.065755 kernel: audit: type=1103 audit(1757725212.013:1742): pid=6935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.065896 kernel: audit: type=1006 audit(1757725212.013:1743): pid=6935 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Sep 13 01:00:12.065940 kernel: audit: type=1300 audit(1757725212.013:1743): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2ed4f50 a2=3 a3=0 items=0 ppid=1 pid=6935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:12.013000 audit[6935]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2ed4f50 a2=3 a3=0 items=0 ppid=1 pid=6935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:12.013000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:12.046000 audit[6935]: USER_START pid=6935 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.109353 kernel: audit: type=1327 audit(1757725212.013:1743): proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:12.109708 kernel: audit: type=1105 audit(1757725212.046:1744): pid=6935 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.109757 kernel: audit: type=1103 audit(1757725212.051:1745): pid=6937 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.051000 audit[6937]: CRED_ACQ pid=6937 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.491179 sshd[6935]: pam_unix(sshd:session): session closed for user core Sep 13 01:00:12.491000 audit[6935]: USER_END pid=6935 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.494466 systemd[1]: sshd@24-10.200.4.13:22-10.200.16.10:35606.service: Deactivated successfully. Sep 13 01:00:12.495262 systemd[1]: session-27.scope: Deactivated successfully. Sep 13 01:00:12.496753 systemd-logind[1435]: Session 27 logged out. Waiting for processes to exit. Sep 13 01:00:12.497750 systemd-logind[1435]: Removed session 27. Sep 13 01:00:12.491000 audit[6935]: CRED_DISP pid=6935 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.514692 kernel: audit: type=1106 audit(1757725212.491:1746): pid=6935 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.514735 kernel: audit: type=1104 audit(1757725212.491:1747): pid=6935 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:12.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.13:22-10.200.16.10:35606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:12.684086 systemd[1]: run-containerd-runc-k8s.io-cb249c3ce40203d160d5ea4837a0db72873a299ac6eb08e3daeef844708d6144-runc.6H8xU7.mount: Deactivated successfully. Sep 13 01:00:13.671000 audit[5692]: AVC avc: denied { watch } for pid=5692 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_56_37.3458278660/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c613 tclass=file permissive=0 Sep 13 01:00:13.671000 audit[5692]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001628140 a2=fc6 a3=0 items=0 ppid=4846 pid=5692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c613 key=(null) Sep 13 01:00:13.671000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 01:00:16.580395 systemd[1]: run-containerd-runc-k8s.io-0be7eae89b4119715ba5f1cf10bd4af84889907313cc6990d3da2699fba955af-runc.pTFqTM.mount: Deactivated successfully. Sep 13 01:00:17.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.13:22-10.200.16.10:35618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:17.592880 systemd[1]: Started sshd@25-10.200.4.13:22-10.200.16.10:35618.service. Sep 13 01:00:17.598263 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 01:00:17.598340 kernel: audit: type=1130 audit(1757725217.591:1750): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.13:22-10.200.16.10:35618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:18.180000 audit[6988]: USER_ACCT pid=6988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.182730 sshd[6988]: Accepted publickey for core from 10.200.16.10 port 35618 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 01:00:18.200000 audit[6988]: CRED_ACQ pid=6988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.202483 sshd[6988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:00:18.211779 systemd[1]: Started session-28.scope. Sep 13 01:00:18.213009 systemd-logind[1435]: New session 28 of user core. Sep 13 01:00:18.221361 kernel: audit: type=1101 audit(1757725218.180:1751): pid=6988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.221490 kernel: audit: type=1103 audit(1757725218.200:1752): pid=6988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.221555 kernel: audit: type=1006 audit(1757725218.200:1753): pid=6988 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Sep 13 01:00:18.200000 audit[6988]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc56ddac40 a2=3 a3=0 items=0 ppid=1 pid=6988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:18.249919 kernel: audit: type=1300 audit(1757725218.200:1753): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc56ddac40 a2=3 a3=0 items=0 ppid=1 pid=6988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:18.253549 kernel: audit: type=1327 audit(1757725218.200:1753): proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:18.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:18.217000 audit[6988]: USER_START pid=6988 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.256649 kernel: audit: type=1105 audit(1757725218.217:1754): pid=6988 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.219000 audit[6990]: CRED_ACQ pid=6990 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.296542 kernel: audit: type=1103 audit(1757725218.219:1755): pid=6990 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.663397 sshd[6988]: pam_unix(sshd:session): session closed for user core Sep 13 01:00:18.663000 audit[6988]: USER_END pid=6988 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.666585 systemd[1]: sshd@25-10.200.4.13:22-10.200.16.10:35618.service: Deactivated successfully. Sep 13 01:00:18.667384 systemd[1]: session-28.scope: Deactivated successfully. Sep 13 01:00:18.669081 systemd-logind[1435]: Session 28 logged out. Waiting for processes to exit. Sep 13 01:00:18.670128 systemd-logind[1435]: Removed session 28. Sep 13 01:00:18.683533 kernel: audit: type=1106 audit(1757725218.663:1756): pid=6988 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.683607 kernel: audit: type=1104 audit(1757725218.663:1757): pid=6988 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.663000 audit[6988]: CRED_DISP pid=6988 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:18.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.13:22-10.200.16.10:35618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:23.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.13:22-10.200.16.10:50506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:23.762328 systemd[1]: Started sshd@26-10.200.4.13:22-10.200.16.10:50506.service. Sep 13 01:00:23.767954 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 01:00:23.768057 kernel: audit: type=1130 audit(1757725223.761:1759): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.13:22-10.200.16.10:50506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:24.361000 audit[7000]: USER_ACCT pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.382242 sshd[7000]: Accepted publickey for core from 10.200.16.10 port 50506 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 01:00:24.382566 kernel: audit: type=1101 audit(1757725224.361:1760): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.380000 audit[7000]: CRED_ACQ pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.382715 sshd[7000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:00:24.389172 systemd[1]: Started session-29.scope. Sep 13 01:00:24.390336 systemd-logind[1435]: New session 29 of user core. Sep 13 01:00:24.400555 kernel: audit: type=1103 audit(1757725224.380:1761): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.400628 kernel: audit: type=1006 audit(1757725224.380:1762): pid=7000 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Sep 13 01:00:24.380000 audit[7000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd41c135b0 a2=3 a3=0 items=0 ppid=1 pid=7000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:24.428147 kernel: audit: type=1300 audit(1757725224.380:1762): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd41c135b0 a2=3 a3=0 items=0 ppid=1 pid=7000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:00:24.380000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:24.428531 kernel: audit: type=1327 audit(1757725224.380:1762): proctitle=737368643A20636F7265205B707269765D Sep 13 01:00:24.394000 audit[7000]: USER_START pid=7000 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.453652 kernel: audit: type=1105 audit(1757725224.394:1763): pid=7000 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.453761 kernel: audit: type=1103 audit(1757725224.396:1764): pid=7002 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.396000 audit[7002]: CRED_ACQ pid=7002 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.860692 sshd[7000]: pam_unix(sshd:session): session closed for user core Sep 13 01:00:24.860000 audit[7000]: USER_END pid=7000 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.863640 systemd-logind[1435]: Session 29 logged out. Waiting for processes to exit. Sep 13 01:00:24.864899 systemd[1]: sshd@26-10.200.4.13:22-10.200.16.10:50506.service: Deactivated successfully. Sep 13 01:00:24.865667 systemd[1]: session-29.scope: Deactivated successfully. Sep 13 01:00:24.866981 systemd-logind[1435]: Removed session 29. Sep 13 01:00:24.860000 audit[7000]: CRED_DISP pid=7000 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.881542 kernel: audit: type=1106 audit(1757725224.860:1765): pid=7000 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.881601 kernel: audit: type=1104 audit(1757725224.860:1766): pid=7000 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:00:24.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.13:22-10.200.16.10:50506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:00:25.107000 audit[5970]: AVC avc: denied { watch } for pid=5970 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_57_20.593248143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c136 tclass=file permissive=0 Sep 13 01:00:25.107000 audit[5970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0027aeb00 a2=fc6 a3=0 items=0 ppid=5905 pid=5970 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c136 key=(null) Sep 13 01:00:25.107000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274