Sep 13 00:50:16.038892 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:50:16.038925 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:50:16.038939 kernel: BIOS-provided physical RAM map: Sep 13 00:50:16.038947 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:50:16.038956 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 13 00:50:16.038974 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 13 00:50:16.038988 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc4fff] reserved Sep 13 00:50:16.038998 kernel: BIOS-e820: [mem 0x000000003ffc5000-0x000000003ffd1fff] usable Sep 13 00:50:16.039006 kernel: BIOS-e820: [mem 0x000000003ffd2000-0x000000003fffafff] ACPI data Sep 13 00:50:16.039015 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 13 00:50:16.039025 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 13 00:50:16.039034 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 13 00:50:16.039044 kernel: printk: bootconsole [earlyser0] enabled Sep 13 00:50:16.039054 kernel: NX (Execute Disable) protection: active Sep 13 00:50:16.039067 kernel: efi: EFI v2.70 by Microsoft Sep 13 00:50:16.039076 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f33fa98 RNG=0x3ffd2018 Sep 13 00:50:16.039085 kernel: random: crng init done Sep 13 00:50:16.039098 kernel: SMBIOS 3.1.0 present. Sep 13 00:50:16.039104 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 00:50:16.039113 kernel: Hypervisor detected: Microsoft Hyper-V Sep 13 00:50:16.039121 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 13 00:50:16.039127 kernel: Hyper-V Host Build:26100-10.0-1-0.1293 Sep 13 00:50:16.039157 kernel: Hyper-V: Nested features: 0x1e0101 Sep 13 00:50:16.039166 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 13 00:50:16.039172 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 13 00:50:16.039178 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 13 00:50:16.039185 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 13 00:50:16.039196 kernel: tsc: Detected 2793.437 MHz processor Sep 13 00:50:16.039204 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:50:16.039210 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:50:16.039217 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 13 00:50:16.039235 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:50:16.039243 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 13 00:50:16.039248 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 13 00:50:16.039257 kernel: Using GB pages for direct mapping Sep 13 00:50:16.039269 kernel: Secure boot disabled Sep 13 00:50:16.039274 kernel: ACPI: Early table checksum verification disabled Sep 13 00:50:16.039280 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 13 00:50:16.039288 kernel: ACPI: XSDT 0x000000003FFF90E8 00005C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039297 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039307 kernel: ACPI: DSDT 0x000000003FFD6000 01E11C (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 00:50:16.039313 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 13 00:50:16.039319 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039325 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039334 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039342 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039350 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039356 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:50:16.039362 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 13 00:50:16.039368 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff411b] Sep 13 00:50:16.039374 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 13 00:50:16.039391 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 13 00:50:16.039399 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 13 00:50:16.039406 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 13 00:50:16.039417 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 13 00:50:16.039425 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 13 00:50:16.039430 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 13 00:50:16.039438 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:50:16.039447 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:50:16.039453 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 13 00:50:16.039458 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 13 00:50:16.039464 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 13 00:50:16.039470 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 13 00:50:16.039477 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 13 00:50:16.039493 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 13 00:50:16.039508 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 13 00:50:16.039515 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 13 00:50:16.039521 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 13 00:50:16.039527 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 13 00:50:16.039533 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 13 00:50:16.039541 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 13 00:50:16.039558 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 13 00:50:16.039575 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 13 00:50:16.039581 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 13 00:50:16.039589 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 13 00:50:16.039598 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 13 00:50:16.039604 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Sep 13 00:50:16.039613 kernel: Zone ranges: Sep 13 00:50:16.039620 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:50:16.039626 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 13 00:50:16.039634 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:50:16.039650 kernel: Movable zone start for each node Sep 13 00:50:16.039659 kernel: Early memory node ranges Sep 13 00:50:16.039671 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 13 00:50:16.039676 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 13 00:50:16.039682 kernel: node 0: [mem 0x000000003ffc5000-0x000000003ffd1fff] Sep 13 00:50:16.039691 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 13 00:50:16.039710 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:50:16.039723 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 13 00:50:16.039729 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:50:16.039740 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 13 00:50:16.039755 kernel: On node 0, zone DMA32: 132 pages in unavailable ranges Sep 13 00:50:16.039773 kernel: On node 0, zone DMA32: 45 pages in unavailable ranges Sep 13 00:50:16.039781 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 13 00:50:16.039786 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 13 00:50:16.039793 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:50:16.039802 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:50:16.039809 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:50:16.039815 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 13 00:50:16.039829 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:50:16.039835 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 13 00:50:16.039841 kernel: Booting paravirtualized kernel on Hyper-V Sep 13 00:50:16.039847 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:50:16.039853 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:50:16.039859 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:50:16.039866 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:50:16.039882 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:50:16.039902 kernel: Hyper-V: PV spinlocks enabled Sep 13 00:50:16.039911 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:50:16.039918 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062375 Sep 13 00:50:16.039934 kernel: Policy zone: Normal Sep 13 00:50:16.039943 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:50:16.039963 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:50:16.039969 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 13 00:50:16.039975 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:50:16.039981 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:50:16.039991 kernel: Memory: 8076668K/8387512K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 310584K reserved, 0K cma-reserved) Sep 13 00:50:16.040008 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:50:16.040021 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:50:16.040039 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:50:16.040047 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:50:16.040056 kernel: rcu: RCU event tracing is enabled. Sep 13 00:50:16.040065 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:50:16.040071 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:50:16.040083 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:50:16.040090 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:50:16.040096 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:50:16.040105 kernel: Using NULL legacy PIC Sep 13 00:50:16.040118 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 13 00:50:16.040124 kernel: Console: colour dummy device 80x25 Sep 13 00:50:16.040134 kernel: printk: console [tty1] enabled Sep 13 00:50:16.040148 kernel: printk: console [ttyS0] enabled Sep 13 00:50:16.040154 kernel: printk: bootconsole [earlyser0] disabled Sep 13 00:50:16.040166 kernel: ACPI: Core revision 20210730 Sep 13 00:50:16.040174 kernel: Failed to register legacy timer interrupt Sep 13 00:50:16.040182 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:50:16.040192 kernel: Hyper-V: Using IPI hypercalls Sep 13 00:50:16.040198 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5586.87 BogoMIPS (lpj=2793437) Sep 13 00:50:16.040204 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 13 00:50:16.040213 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 13 00:50:16.040230 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 13 00:50:16.040241 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:50:16.040250 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:50:16.040258 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:50:16.040273 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 13 00:50:16.040283 kernel: RETBleed: Vulnerable Sep 13 00:50:16.040293 kernel: Speculative Store Bypass: Vulnerable Sep 13 00:50:16.040299 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:50:16.040308 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:50:16.040320 kernel: active return thunk: its_return_thunk Sep 13 00:50:16.040330 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:50:16.040338 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:50:16.040344 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:50:16.040354 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:50:16.040367 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 13 00:50:16.040376 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 13 00:50:16.040387 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 13 00:50:16.040393 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:50:16.040401 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 13 00:50:16.040410 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 13 00:50:16.040416 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 13 00:50:16.040422 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 13 00:50:16.040428 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:50:16.040434 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:50:16.040446 kernel: LSM: Security Framework initializing Sep 13 00:50:16.040462 kernel: SELinux: Initializing. Sep 13 00:50:16.040468 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:50:16.040474 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:50:16.040488 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8370C CPU @ 2.80GHz (family: 0x6, model: 0x6a, stepping: 0x6) Sep 13 00:50:16.040496 kernel: Performance Events: unsupported p6 CPU model 106 no PMU driver, software events only. Sep 13 00:50:16.040512 kernel: signal: max sigframe size: 3632 Sep 13 00:50:16.040520 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:50:16.040526 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:50:16.040533 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:50:16.040547 kernel: x86: Booting SMP configuration: Sep 13 00:50:16.040555 kernel: .... node #0, CPUs: #1 Sep 13 00:50:16.040565 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 13 00:50:16.040573 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:50:16.040579 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:50:16.040593 kernel: smpboot: Max logical packages: 1 Sep 13 00:50:16.040603 kernel: smpboot: Total of 2 processors activated (11173.74 BogoMIPS) Sep 13 00:50:16.040615 kernel: devtmpfs: initialized Sep 13 00:50:16.040623 kernel: x86/mm: Memory block size: 128MB Sep 13 00:50:16.040634 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 13 00:50:16.040642 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:50:16.040649 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:50:16.040660 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:50:16.040668 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:50:16.040675 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:50:16.040681 kernel: audit: type=2000 audit(1757724615.024:1): state=initialized audit_enabled=0 res=1 Sep 13 00:50:16.040690 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:50:16.040699 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:50:16.040707 kernel: cpuidle: using governor menu Sep 13 00:50:16.040716 kernel: ACPI: bus type PCI registered Sep 13 00:50:16.040723 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:50:16.040729 kernel: dca service started, version 1.12.1 Sep 13 00:50:16.040738 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:50:16.040746 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:50:16.040753 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:50:16.040766 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:50:16.040775 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:50:16.040782 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:50:16.040798 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:50:16.040808 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:50:16.040819 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:50:16.040826 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:50:16.040844 kernel: ACPI: Interpreter enabled Sep 13 00:50:16.040855 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:50:16.040868 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:50:16.040874 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:50:16.040892 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 13 00:50:16.040911 kernel: iommu: Default domain type: Translated Sep 13 00:50:16.040918 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:50:16.040926 kernel: vgaarb: loaded Sep 13 00:50:16.040943 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:50:16.040957 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:50:16.040965 kernel: PTP clock support registered Sep 13 00:50:16.040971 kernel: Registered efivars operations Sep 13 00:50:16.040979 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:50:16.040995 kernel: PCI: System does not support PCI Sep 13 00:50:16.041004 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 13 00:50:16.041012 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:50:16.041018 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:50:16.041025 kernel: pnp: PnP ACPI init Sep 13 00:50:16.041043 kernel: pnp: PnP ACPI: found 3 devices Sep 13 00:50:16.041052 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:50:16.041063 kernel: NET: Registered PF_INET protocol family Sep 13 00:50:16.041069 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:50:16.041089 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 13 00:50:16.041097 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:50:16.041108 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:50:16.041114 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 13 00:50:16.041121 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 13 00:50:16.041130 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:50:16.041149 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:50:16.041160 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:50:16.041167 kernel: NET: Registered PF_XDP protocol family Sep 13 00:50:16.041177 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:50:16.041191 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 13 00:50:16.041205 kernel: software IO TLB: mapped [mem 0x000000003aa89000-0x000000003ea89000] (64MB) Sep 13 00:50:16.041213 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:50:16.041221 kernel: Initialise system trusted keyrings Sep 13 00:50:16.041238 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 13 00:50:16.041253 kernel: Key type asymmetric registered Sep 13 00:50:16.041261 kernel: Asymmetric key parser 'x509' registered Sep 13 00:50:16.041269 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:50:16.041280 kernel: io scheduler mq-deadline registered Sep 13 00:50:16.041288 kernel: io scheduler kyber registered Sep 13 00:50:16.041297 kernel: io scheduler bfq registered Sep 13 00:50:16.041303 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:50:16.041309 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:50:16.041324 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:50:16.041333 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 13 00:50:16.041345 kernel: i8042: PNP: No PS/2 controller found. Sep 13 00:50:16.041495 kernel: rtc_cmos 00:02: registered as rtc0 Sep 13 00:50:16.041621 kernel: rtc_cmos 00:02: setting system clock to 2025-09-13T00:50:15 UTC (1757724615) Sep 13 00:50:16.041732 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 13 00:50:16.041740 kernel: intel_pstate: CPU model not supported Sep 13 00:50:16.041752 kernel: efifb: probing for efifb Sep 13 00:50:16.041758 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 00:50:16.041771 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 00:50:16.041779 kernel: efifb: scrolling: redraw Sep 13 00:50:16.041788 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 00:50:16.041803 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:50:16.041814 kernel: fb0: EFI VGA frame buffer device Sep 13 00:50:16.041826 kernel: pstore: Registered efi as persistent store backend Sep 13 00:50:16.041832 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:50:16.041842 kernel: Segment Routing with IPv6 Sep 13 00:50:16.041850 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:50:16.041859 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:50:16.041872 kernel: Key type dns_resolver registered Sep 13 00:50:16.041880 kernel: IPI shorthand broadcast: enabled Sep 13 00:50:16.041886 kernel: sched_clock: Marking stable (831772400, 26771000)->(1074026600, -215483200) Sep 13 00:50:16.041892 kernel: registered taskstats version 1 Sep 13 00:50:16.041899 kernel: Loading compiled-in X.509 certificates Sep 13 00:50:16.041917 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:50:16.041935 kernel: Key type .fscrypt registered Sep 13 00:50:16.041941 kernel: Key type fscrypt-provisioning registered Sep 13 00:50:16.041947 kernel: pstore: Using crash dump compression: deflate Sep 13 00:50:16.041956 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:50:16.041973 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:50:16.041985 kernel: ima: No architecture policies found Sep 13 00:50:16.041992 kernel: clk: Disabling unused clocks Sep 13 00:50:16.041999 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:50:16.042019 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:50:16.042031 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:50:16.042038 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:50:16.042044 kernel: Run /init as init process Sep 13 00:50:16.042053 kernel: with arguments: Sep 13 00:50:16.042072 kernel: /init Sep 13 00:50:16.042085 kernel: with environment: Sep 13 00:50:16.042091 kernel: HOME=/ Sep 13 00:50:16.042100 kernel: TERM=linux Sep 13 00:50:16.042108 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:50:16.042117 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:50:16.042127 systemd[1]: Detected virtualization microsoft. Sep 13 00:50:16.042142 systemd[1]: Detected architecture x86-64. Sep 13 00:50:16.042152 systemd[1]: Running in initrd. Sep 13 00:50:16.042163 systemd[1]: No hostname configured, using default hostname. Sep 13 00:50:16.042172 systemd[1]: Hostname set to . Sep 13 00:50:16.042183 systemd[1]: Initializing machine ID from random generator. Sep 13 00:50:16.042190 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:50:16.042197 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:50:16.042209 systemd[1]: Reached target cryptsetup.target. Sep 13 00:50:16.042215 systemd[1]: Reached target paths.target. Sep 13 00:50:16.042231 systemd[1]: Reached target slices.target. Sep 13 00:50:16.042237 systemd[1]: Reached target swap.target. Sep 13 00:50:16.042246 systemd[1]: Reached target timers.target. Sep 13 00:50:16.042259 systemd[1]: Listening on iscsid.socket. Sep 13 00:50:16.042269 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:50:16.042278 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:50:16.042285 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:50:16.042295 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:50:16.042308 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:50:16.042318 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:50:16.042329 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:50:16.042336 systemd[1]: Reached target sockets.target. Sep 13 00:50:16.042346 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:50:16.042359 systemd[1]: Finished network-cleanup.service. Sep 13 00:50:16.042366 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:50:16.042377 systemd[1]: Starting systemd-journald.service... Sep 13 00:50:16.042387 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:50:16.042393 systemd[1]: Starting systemd-resolved.service... Sep 13 00:50:16.042409 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:50:16.042421 systemd-journald[183]: Journal started Sep 13 00:50:16.042468 systemd-journald[183]: Runtime Journal (/run/log/journal/b84fc57effcc487ba980d9b77be9dc6c) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:50:16.044434 systemd-modules-load[184]: Inserted module 'overlay' Sep 13 00:50:16.063162 systemd[1]: Started systemd-journald.service. Sep 13 00:50:16.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.071736 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:50:16.086917 kernel: audit: type=1130 audit(1757724616.071:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.089830 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:50:16.092435 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:50:16.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.093514 systemd-resolved[185]: Positive Trust Anchors: Sep 13 00:50:16.136201 kernel: audit: type=1130 audit(1757724616.089:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.093523 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:50:16.093553 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:50:16.222244 kernel: audit: type=1130 audit(1757724616.092:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.222285 kernel: audit: type=1130 audit(1757724616.094:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.222302 kernel: audit: type=1130 audit(1757724616.103:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.222318 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:50:16.222333 kernel: audit: type=1130 audit(1757724616.194:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.095989 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:50:16.097485 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 13 00:50:16.098969 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:50:16.101684 systemd[1]: Started systemd-resolved.service. Sep 13 00:50:16.104225 systemd[1]: Reached target nss-lookup.target. Sep 13 00:50:16.157768 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:50:16.222845 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:50:16.243862 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:50:16.263439 kernel: audit: type=1130 audit(1757724616.242:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.269515 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 13 00:50:16.272188 kernel: Bridge firewalling registered Sep 13 00:50:16.272923 dracut-cmdline[201]: dracut-dracut-053 Sep 13 00:50:16.277576 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:50:16.321160 kernel: SCSI subsystem initialized Sep 13 00:50:16.350232 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:50:16.350308 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:50:16.358125 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:50:16.358155 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:50:16.366221 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 13 00:50:16.369809 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:50:16.393264 kernel: audit: type=1130 audit(1757724616.372:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.373235 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:50:16.399849 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:50:16.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.418157 kernel: audit: type=1130 audit(1757724616.402:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.428156 kernel: iscsi: registered transport (tcp) Sep 13 00:50:16.457285 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:50:16.457356 kernel: QLogic iSCSI HBA Driver Sep 13 00:50:16.485561 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:50:16.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:16.488895 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:50:16.542167 kernel: raid6: avx512x4 gen() 43751 MB/s Sep 13 00:50:16.562152 kernel: raid6: avx512x4 xor() 10252 MB/s Sep 13 00:50:16.582174 kernel: raid6: avx512x2 gen() 42767 MB/s Sep 13 00:50:16.603169 kernel: raid6: avx512x2 xor() 26924 MB/s Sep 13 00:50:16.624175 kernel: raid6: avx512x1 gen() 41308 MB/s Sep 13 00:50:16.645153 kernel: raid6: avx512x1 xor() 24808 MB/s Sep 13 00:50:16.667153 kernel: raid6: avx2x4 gen() 33606 MB/s Sep 13 00:50:16.688176 kernel: raid6: avx2x4 xor() 10587 MB/s Sep 13 00:50:16.708184 kernel: raid6: avx2x2 gen() 32613 MB/s Sep 13 00:50:16.729157 kernel: raid6: avx2x2 xor() 21479 MB/s Sep 13 00:50:16.749156 kernel: raid6: avx2x1 gen() 26466 MB/s Sep 13 00:50:16.769149 kernel: raid6: avx2x1 xor() 17133 MB/s Sep 13 00:50:16.790171 kernel: raid6: sse2x4 gen() 10262 MB/s Sep 13 00:50:16.810153 kernel: raid6: sse2x4 xor() 5950 MB/s Sep 13 00:50:16.830152 kernel: raid6: sse2x2 gen() 9903 MB/s Sep 13 00:50:16.851154 kernel: raid6: sse2x2 xor() 6648 MB/s Sep 13 00:50:16.871157 kernel: raid6: sse2x1 gen() 8655 MB/s Sep 13 00:50:16.894622 kernel: raid6: sse2x1 xor() 5315 MB/s Sep 13 00:50:16.894644 kernel: raid6: using algorithm avx512x4 gen() 43751 MB/s Sep 13 00:50:16.894654 kernel: raid6: .... xor() 10252 MB/s, rmw enabled Sep 13 00:50:16.898202 kernel: raid6: using avx512x2 recovery algorithm Sep 13 00:50:16.919163 kernel: xor: automatically using best checksumming function avx Sep 13 00:50:17.021162 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:50:17.029047 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:50:17.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:17.033000 audit: BPF prog-id=7 op=LOAD Sep 13 00:50:17.033000 audit: BPF prog-id=8 op=LOAD Sep 13 00:50:17.034548 systemd[1]: Starting systemd-udevd.service... Sep 13 00:50:17.049971 systemd-udevd[384]: Using default interface naming scheme 'v252'. Sep 13 00:50:17.057205 systemd[1]: Started systemd-udevd.service. Sep 13 00:50:17.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:17.064472 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:50:17.081495 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation Sep 13 00:50:17.110605 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:50:17.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:17.114623 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:50:17.152913 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:50:17.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:17.197161 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:50:17.211157 kernel: hv_vmbus: Vmbus version:5.2 Sep 13 00:50:17.230161 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 00:50:17.251154 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 00:50:17.257158 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:50:17.257200 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 13 00:50:17.271519 kernel: AES CTR mode by8 optimization enabled Sep 13 00:50:17.271560 kernel: scsi host1: storvsc_host_t Sep 13 00:50:17.278298 kernel: scsi host0: storvsc_host_t Sep 13 00:50:17.286781 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 00:50:17.295259 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:50:17.302163 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 5 Sep 13 00:50:17.302235 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 00:50:17.322195 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 00:50:17.336038 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 13 00:50:17.336092 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 00:50:17.352073 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 00:50:17.371509 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 00:50:17.371529 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 00:50:17.382648 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 00:50:17.382825 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 00:50:17.382989 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 00:50:17.383152 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 00:50:17.383307 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 00:50:17.383459 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:17.383475 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 00:50:17.410168 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#170 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:50:17.417163 kernel: hv_netvsc 7c1e5204-4957-7c1e-5204-49577c1e5204 eth0: VF slot 1 added Sep 13 00:50:17.427165 kernel: hv_vmbus: registering driver hv_pci Sep 13 00:50:17.434164 kernel: hv_pci dbfb87b3-a8ee-4804-8f69-365ab6ad0c74: PCI VMBus probing: Using version 0x10004 Sep 13 00:50:17.523082 kernel: hv_pci dbfb87b3-a8ee-4804-8f69-365ab6ad0c74: PCI host bridge to bus a8ee:00 Sep 13 00:50:17.523401 kernel: pci_bus a8ee:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 13 00:50:17.523864 kernel: pci_bus a8ee:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 00:50:17.524100 kernel: pci a8ee:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 00:50:17.524421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#136 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:50:17.524602 kernel: pci a8ee:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:50:17.524711 kernel: pci a8ee:00:02.0: enabling Extended Tags Sep 13 00:50:17.524806 kernel: pci a8ee:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at a8ee:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 00:50:17.525033 kernel: pci_bus a8ee:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 00:50:17.525178 kernel: pci a8ee:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:50:17.616266 kernel: mlx5_core a8ee:00:02.0: enabling device (0000 -> 0002) Sep 13 00:50:17.849875 kernel: mlx5_core a8ee:00:02.0: firmware version: 16.30.5000 Sep 13 00:50:17.850062 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (446) Sep 13 00:50:17.850080 kernel: mlx5_core a8ee:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 00:50:17.850241 kernel: mlx5_core a8ee:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 13 00:50:17.850386 kernel: mlx5_core a8ee:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing Sep 13 00:50:17.850486 kernel: hv_netvsc 7c1e5204-4957-7c1e-5204-49577c1e5204 eth0: VF registering: eth1 Sep 13 00:50:17.850585 kernel: mlx5_core a8ee:00:02.0 eth1: joined to eth0 Sep 13 00:50:17.723481 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:50:17.753456 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:50:17.865156 kernel: mlx5_core a8ee:00:02.0 enP43246s1: renamed from eth1 Sep 13 00:50:17.906526 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:50:17.913570 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:50:17.921395 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:50:17.928622 systemd[1]: Starting disk-uuid.service... Sep 13 00:50:17.943187 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:17.954158 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:18.963155 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:50:18.963501 disk-uuid[565]: The operation has completed successfully. Sep 13 00:50:19.043104 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:50:19.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.043218 systemd[1]: Finished disk-uuid.service. Sep 13 00:50:19.046455 systemd[1]: Starting verity-setup.service... Sep 13 00:50:19.086167 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Sep 13 00:50:19.384008 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:50:19.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.386792 systemd[1]: Finished verity-setup.service. Sep 13 00:50:19.392338 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:50:19.468171 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:50:19.468548 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:50:19.471207 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:50:19.471983 systemd[1]: Starting ignition-setup.service... Sep 13 00:50:19.480054 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:50:19.505440 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:50:19.505488 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:50:19.505500 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:50:19.551288 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:50:19.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.556000 audit: BPF prog-id=9 op=LOAD Sep 13 00:50:19.557315 systemd[1]: Starting systemd-networkd.service... Sep 13 00:50:19.581373 systemd-networkd[829]: lo: Link UP Sep 13 00:50:19.581382 systemd-networkd[829]: lo: Gained carrier Sep 13 00:50:19.586882 systemd-networkd[829]: Enumeration completed Sep 13 00:50:19.587785 systemd-networkd[829]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:50:19.590067 systemd[1]: Started systemd-networkd.service. Sep 13 00:50:19.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.599444 systemd[1]: Reached target network.target. Sep 13 00:50:19.605370 systemd[1]: Starting iscsiuio.service... Sep 13 00:50:19.611203 systemd[1]: Started iscsiuio.service. Sep 13 00:50:19.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.616978 systemd[1]: Starting iscsid.service... Sep 13 00:50:19.625601 iscsid[834]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:50:19.625601 iscsid[834]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 00:50:19.625601 iscsid[834]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:50:19.625601 iscsid[834]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:50:19.625601 iscsid[834]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:50:19.625601 iscsid[834]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:50:19.625601 iscsid[834]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:50:19.673808 kernel: mlx5_core a8ee:00:02.0 enP43246s1: Link up Sep 13 00:50:19.674055 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:50:19.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.625679 systemd[1]: Started iscsid.service. Sep 13 00:50:19.676966 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:50:19.688411 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:50:19.701093 kernel: hv_netvsc 7c1e5204-4957-7c1e-5204-49577c1e5204 eth0: Data path switched to VF: enP43246s1 Sep 13 00:50:19.709804 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:50:19.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.701154 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:50:19.703677 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:50:19.712465 systemd[1]: Reached target remote-fs.target. Sep 13 00:50:19.714622 systemd-networkd[829]: enP43246s1: Link UP Sep 13 00:50:19.714903 systemd-networkd[829]: eth0: Link UP Sep 13 00:50:19.716120 systemd-networkd[829]: eth0: Gained carrier Sep 13 00:50:19.722171 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:50:19.731733 systemd-networkd[829]: enP43246s1: Gained carrier Sep 13 00:50:19.739406 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:50:19.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.739930 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:50:19.742260 systemd-networkd[829]: eth0: DHCPv4 address 10.200.4.44/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:50:19.783111 systemd[1]: Finished ignition-setup.service. Sep 13 00:50:19.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.789271 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:50:21.341251 systemd-networkd[829]: eth0: Gained IPv6LL Sep 13 00:50:22.424295 ignition[856]: Ignition 2.14.0 Sep 13 00:50:22.424308 ignition[856]: Stage: fetch-offline Sep 13 00:50:22.424371 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:22.424412 ignition[856]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:22.555854 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:22.556021 ignition[856]: parsed url from cmdline: "" Sep 13 00:50:22.556025 ignition[856]: no config URL provided Sep 13 00:50:22.556030 ignition[856]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:50:22.556037 ignition[856]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:50:22.556043 ignition[856]: failed to fetch config: resource requires networking Sep 13 00:50:22.559376 ignition[856]: Ignition finished successfully Sep 13 00:50:22.573236 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:50:22.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.577161 systemd[1]: Starting ignition-fetch.service... Sep 13 00:50:22.602331 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 13 00:50:22.602371 kernel: audit: type=1130 audit(1757724622.576:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.603932 ignition[862]: Ignition 2.14.0 Sep 13 00:50:22.603944 ignition[862]: Stage: fetch Sep 13 00:50:22.604072 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:22.604104 ignition[862]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:22.614381 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:22.614535 ignition[862]: parsed url from cmdline: "" Sep 13 00:50:22.614538 ignition[862]: no config URL provided Sep 13 00:50:22.614543 ignition[862]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:50:22.614553 ignition[862]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:50:22.614585 ignition[862]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 00:50:22.705401 ignition[862]: GET result: OK Sep 13 00:50:22.705496 ignition[862]: config has been read from IMDS userdata Sep 13 00:50:22.705529 ignition[862]: parsing config with SHA512: 578e456c152f9009f3033c1492905e31f0e2f26afc504619265efda5b353a18014fa045b883ecfc8314eadecb881b73520cc16992ed64ead02c04021a5d5a76e Sep 13 00:50:22.709030 unknown[862]: fetched base config from "system" Sep 13 00:50:22.709049 unknown[862]: fetched base config from "system" Sep 13 00:50:22.712798 ignition[862]: fetch: fetch complete Sep 13 00:50:22.709054 unknown[862]: fetched user config from "azure" Sep 13 00:50:22.712804 ignition[862]: fetch: fetch passed Sep 13 00:50:22.714402 systemd[1]: Finished ignition-fetch.service. Sep 13 00:50:22.712847 ignition[862]: Ignition finished successfully Sep 13 00:50:22.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.730182 systemd[1]: Starting ignition-kargs.service... Sep 13 00:50:22.748158 kernel: audit: type=1130 audit(1757724622.728:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.756609 ignition[868]: Ignition 2.14.0 Sep 13 00:50:22.756620 ignition[868]: Stage: kargs Sep 13 00:50:22.756756 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:22.756784 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:22.768453 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:22.772935 ignition[868]: kargs: kargs passed Sep 13 00:50:22.772994 ignition[868]: Ignition finished successfully Sep 13 00:50:22.777903 systemd[1]: Finished ignition-kargs.service. Sep 13 00:50:22.781287 systemd[1]: Starting ignition-disks.service... Sep 13 00:50:22.805040 kernel: audit: type=1130 audit(1757724622.780:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.791359 ignition[874]: Ignition 2.14.0 Sep 13 00:50:22.791372 ignition[874]: Stage: disks Sep 13 00:50:22.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.805628 systemd[1]: Finished ignition-disks.service. Sep 13 00:50:22.831222 kernel: audit: type=1130 audit(1757724622.810:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.791493 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:22.810283 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:50:22.791518 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:22.826098 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:50:22.799480 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:22.831201 systemd[1]: Reached target local-fs.target. Sep 13 00:50:22.804602 ignition[874]: disks: disks passed Sep 13 00:50:22.833660 systemd[1]: Reached target sysinit.target. Sep 13 00:50:22.804668 ignition[874]: Ignition finished successfully Sep 13 00:50:22.835985 systemd[1]: Reached target basic.target. Sep 13 00:50:22.843920 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:50:22.911351 systemd-fsck[882]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 13 00:50:22.922890 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:50:22.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.929283 systemd[1]: Mounting sysroot.mount... Sep 13 00:50:22.946309 kernel: audit: type=1130 audit(1757724622.928:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.956256 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:50:22.957180 systemd[1]: Mounted sysroot.mount. Sep 13 00:50:22.965329 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:50:22.994817 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:50:23.000289 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 00:50:23.005622 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:50:23.005753 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:50:23.017168 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:50:23.065163 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:50:23.074102 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:50:23.089526 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (893) Sep 13 00:50:23.098480 initrd-setup-root[898]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:50:23.115024 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:50:23.115072 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:50:23.115086 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:50:23.122217 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:50:23.131899 initrd-setup-root[924]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:50:23.148274 initrd-setup-root[932]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:50:23.169963 initrd-setup-root[940]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:50:23.680222 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:50:23.706283 kernel: audit: type=1130 audit(1757724623.682:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:23.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:23.683734 systemd[1]: Starting ignition-mount.service... Sep 13 00:50:23.699208 systemd[1]: Starting sysroot-boot.service... Sep 13 00:50:23.709665 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:50:23.709780 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:50:23.731721 ignition[960]: INFO : Ignition 2.14.0 Sep 13 00:50:23.731721 ignition[960]: INFO : Stage: mount Sep 13 00:50:23.736277 ignition[960]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:23.736277 ignition[960]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:23.733792 systemd[1]: Finished sysroot-boot.service. Sep 13 00:50:23.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:23.760542 ignition[960]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:23.771150 kernel: audit: type=1130 audit(1757724623.752:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:23.771178 ignition[960]: INFO : mount: mount passed Sep 13 00:50:23.771178 ignition[960]: INFO : Ignition finished successfully Sep 13 00:50:23.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:23.764770 systemd[1]: Finished ignition-mount.service. Sep 13 00:50:23.793182 kernel: audit: type=1130 audit(1757724623.775:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:24.303638 coreos-metadata[892]: Sep 13 00:50:24.303 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:50:24.318347 coreos-metadata[892]: Sep 13 00:50:24.318 INFO Fetch successful Sep 13 00:50:24.351299 coreos-metadata[892]: Sep 13 00:50:24.351 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:50:24.360461 coreos-metadata[892]: Sep 13 00:50:24.360 INFO Fetch successful Sep 13 00:50:24.377702 coreos-metadata[892]: Sep 13 00:50:24.377 INFO wrote hostname ci-3510.3.8-n-99e6272c46 to /sysroot/etc/hostname Sep 13 00:50:24.379425 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 00:50:24.386125 systemd[1]: Starting ignition-files.service... Sep 13 00:50:24.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:24.412222 kernel: audit: type=1130 audit(1757724624.385:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:24.410759 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:50:24.433818 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (972) Sep 13 00:50:24.433851 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:50:24.433871 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:50:24.443359 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:50:24.450208 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:50:24.462501 ignition[991]: INFO : Ignition 2.14.0 Sep 13 00:50:24.462501 ignition[991]: INFO : Stage: files Sep 13 00:50:24.467873 ignition[991]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:24.467873 ignition[991]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:24.482866 ignition[991]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:24.497419 ignition[991]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:50:24.515056 ignition[991]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:50:24.515056 ignition[991]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:50:24.569602 ignition[991]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:50:24.574150 ignition[991]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:50:24.601255 unknown[991]: wrote ssh authorized keys file for user: core Sep 13 00:50:24.604608 ignition[991]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:50:24.613358 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Sep 13 00:50:24.619729 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Sep 13 00:50:24.715204 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Sep 13 00:50:24.922964 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Sep 13 00:50:24.922964 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:50:24.934775 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem326264550" Sep 13 00:50:25.000007 ignition[991]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem326264550": device or resource busy Sep 13 00:50:25.000007 ignition[991]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem326264550", trying btrfs: device or resource busy Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem326264550" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem326264550" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem326264550" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem326264550" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:50:25.000007 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1616429053" Sep 13 00:50:25.000007 ignition[991]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1616429053": device or resource busy Sep 13 00:50:24.955482 systemd[1]: mnt-oem326264550.mount: Deactivated successfully. Sep 13 00:50:25.087428 ignition[991]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1616429053", trying btrfs: device or resource busy Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1616429053" Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1616429053" Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1616429053" Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1616429053" Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:50:25.087428 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Sep 13 00:50:24.976161 systemd[1]: mnt-oem1616429053.mount: Deactivated successfully. Sep 13 00:50:25.446411 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Sep 13 00:50:25.616557 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:50:25.616557 ignition[991]: INFO : files: op(13): [started] processing unit "waagent.service" Sep 13 00:50:25.616557 ignition[991]: INFO : files: op(13): [finished] processing unit "waagent.service" Sep 13 00:50:25.656307 kernel: audit: type=1130 audit(1757724625.626:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(14): [started] processing unit "nvidia.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(14): [finished] processing unit "nvidia.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Sep 13 00:50:25.656394 ignition[991]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:50:25.656394 ignition[991]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:50:25.656394 ignition[991]: INFO : files: files passed Sep 13 00:50:25.656394 ignition[991]: INFO : Ignition finished successfully Sep 13 00:50:25.620190 systemd[1]: Finished ignition-files.service. Sep 13 00:50:25.628019 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:50:25.737061 initrd-setup-root-after-ignition[1015]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:50:25.651662 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:50:25.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.656178 systemd[1]: Starting ignition-quench.service... Sep 13 00:50:25.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.734471 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:50:25.753028 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:50:25.753134 systemd[1]: Finished ignition-quench.service. Sep 13 00:50:25.757964 systemd[1]: Reached target ignition-complete.target. Sep 13 00:50:25.763635 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:50:25.780114 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:50:25.780217 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:50:25.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.787735 systemd[1]: Reached target initrd-fs.target. Sep 13 00:50:25.791730 systemd[1]: Reached target initrd.target. Sep 13 00:50:25.795561 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:50:25.799477 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:50:25.813430 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:50:25.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.816527 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:50:25.829414 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:50:25.832518 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:50:25.837827 systemd[1]: Stopped target timers.target. Sep 13 00:50:25.842975 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:50:25.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.843128 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:50:25.847795 systemd[1]: Stopped target initrd.target. Sep 13 00:50:25.852725 systemd[1]: Stopped target basic.target. Sep 13 00:50:25.857175 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:50:25.862250 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:50:25.867215 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:50:25.872547 systemd[1]: Stopped target remote-fs.target. Sep 13 00:50:25.876895 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:50:25.881584 systemd[1]: Stopped target sysinit.target. Sep 13 00:50:25.885692 systemd[1]: Stopped target local-fs.target. Sep 13 00:50:25.889819 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:50:25.893786 systemd[1]: Stopped target swap.target. Sep 13 00:50:25.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.897739 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:50:25.897910 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:50:25.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.901999 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:50:25.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.905709 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:50:25.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.905895 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:50:25.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.910571 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:50:25.910702 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:50:25.915574 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:50:25.915709 systemd[1]: Stopped ignition-files.service. Sep 13 00:50:25.943502 ignition[1029]: INFO : Ignition 2.14.0 Sep 13 00:50:25.943502 ignition[1029]: INFO : Stage: umount Sep 13 00:50:25.943502 ignition[1029]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:50:25.943502 ignition[1029]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:50:25.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.967916 iscsid[834]: iscsid shutting down. Sep 13 00:50:25.919984 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 00:50:25.976293 ignition[1029]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:50:25.976293 ignition[1029]: INFO : umount: umount passed Sep 13 00:50:25.976293 ignition[1029]: INFO : Ignition finished successfully Sep 13 00:50:25.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.920137 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 00:50:25.926327 systemd[1]: Stopping ignition-mount.service... Sep 13 00:50:25.937562 systemd[1]: Stopping iscsid.service... Sep 13 00:50:25.940340 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:50:25.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.949068 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:50:25.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.949288 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:50:26.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.967864 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:50:25.968060 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:50:26.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.988730 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:50:26.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.989585 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:50:25.989690 systemd[1]: Stopped iscsid.service. Sep 13 00:50:25.992880 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:50:25.992970 systemd[1]: Stopped ignition-mount.service. Sep 13 00:50:25.997583 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:50:26.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.997676 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:50:26.002513 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:50:26.002558 systemd[1]: Stopped ignition-disks.service. Sep 13 00:50:26.006487 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:50:26.006535 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:50:26.012240 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:50:26.012299 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:50:26.017197 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:50:26.017244 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:50:26.022372 systemd[1]: Stopped target paths.target. Sep 13 00:50:26.024519 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:50:26.028173 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:50:26.031820 systemd[1]: Stopped target slices.target. Sep 13 00:50:26.036462 systemd[1]: Stopped target sockets.target. Sep 13 00:50:26.038764 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:50:26.038812 systemd[1]: Closed iscsid.socket. Sep 13 00:50:26.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.042580 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:50:26.042629 systemd[1]: Stopped ignition-setup.service. Sep 13 00:50:26.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.048113 systemd[1]: Stopping iscsiuio.service... Sep 13 00:50:26.086856 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:50:26.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.086946 systemd[1]: Stopped iscsiuio.service. Sep 13 00:50:26.089690 systemd[1]: Stopped target network.target. Sep 13 00:50:26.119000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:50:26.091899 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:50:26.091944 systemd[1]: Closed iscsiuio.socket. Sep 13 00:50:26.094103 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:50:26.096182 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:50:26.098178 systemd-networkd[829]: eth0: DHCPv6 lease lost Sep 13 00:50:26.101072 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:50:26.101184 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:50:26.110683 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:50:26.130000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:50:26.110788 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:50:26.115621 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:50:26.115660 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:50:26.122987 systemd[1]: Stopping network-cleanup.service... Sep 13 00:50:26.150092 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:50:26.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.150202 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:50:26.155680 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:50:26.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.155735 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:50:26.162574 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:50:26.164715 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:50:26.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.171720 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:50:26.177060 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:50:26.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.177645 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:50:26.177785 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:50:26.183742 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:50:26.183794 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:50:26.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.188072 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:50:26.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.188110 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:50:26.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.195443 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:50:26.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.195501 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:50:26.197843 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:50:26.197887 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:50:26.239190 kernel: hv_netvsc 7c1e5204-4957-7c1e-5204-49577c1e5204 eth0: Data path switched from VF: enP43246s1 Sep 13 00:50:26.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.202048 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:50:26.202097 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:50:26.205211 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:50:26.210232 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 13 00:50:26.210302 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 13 00:50:26.213376 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:50:26.213444 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:50:26.216577 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:50:26.218801 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:50:26.229475 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 13 00:50:26.230133 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:50:26.230252 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:50:26.280256 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:50:26.282665 systemd[1]: Stopped network-cleanup.service. Sep 13 00:50:26.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.498521 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:50:26.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.498644 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:50:26.503777 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:50:26.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.508474 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:50:26.508540 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:50:26.514541 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:50:26.528369 systemd[1]: Switching root. Sep 13 00:50:26.551906 systemd-journald[183]: Journal stopped Sep 13 00:50:41.056148 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Sep 13 00:50:41.056174 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:50:41.056187 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:50:41.056197 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:50:41.056206 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:50:41.056214 kernel: SELinux: policy capability open_perms=1 Sep 13 00:50:41.056226 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:50:41.056236 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:50:41.056244 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:50:41.056254 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:50:41.056261 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:50:41.056268 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:50:41.056279 kernel: kauditd_printk_skb: 43 callbacks suppressed Sep 13 00:50:41.056288 kernel: audit: type=1403 audit(1757724628.687:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:50:41.056302 systemd[1]: Successfully loaded SELinux policy in 278.404ms. Sep 13 00:50:41.056313 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.973ms. Sep 13 00:50:41.056327 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:50:41.056336 systemd[1]: Detected virtualization microsoft. Sep 13 00:50:41.056350 systemd[1]: Detected architecture x86-64. Sep 13 00:50:41.056358 systemd[1]: Detected first boot. Sep 13 00:50:41.056369 systemd[1]: Hostname set to . Sep 13 00:50:41.056379 systemd[1]: Initializing machine ID from random generator. Sep 13 00:50:41.056391 kernel: audit: type=1400 audit(1757724629.431:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:41.056400 kernel: audit: type=1400 audit(1757724629.431:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:41.056408 kernel: audit: type=1334 audit(1757724629.451:85): prog-id=10 op=LOAD Sep 13 00:50:41.056421 kernel: audit: type=1334 audit(1757724629.451:86): prog-id=10 op=UNLOAD Sep 13 00:50:41.056429 kernel: audit: type=1334 audit(1757724629.467:87): prog-id=11 op=LOAD Sep 13 00:50:41.056440 kernel: audit: type=1334 audit(1757724629.467:88): prog-id=11 op=UNLOAD Sep 13 00:50:41.056448 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:50:41.056457 kernel: audit: type=1400 audit(1757724630.753:89): avc: denied { associate } for pid=1063 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:50:41.056468 kernel: audit: type=1300 audit(1757724630.753:89): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d394 a1=c0000ce6f0 a2=c0000d6c00 a3=32 items=0 ppid=1046 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:41.056478 kernel: audit: type=1327 audit(1757724630.753:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:50:41.056491 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:50:41.056503 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:50:41.056519 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:50:41.056536 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:50:41.056551 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 13 00:50:41.056565 kernel: audit: type=1334 audit(1757724640.349:91): prog-id=12 op=LOAD Sep 13 00:50:41.056579 kernel: audit: type=1334 audit(1757724640.350:92): prog-id=3 op=UNLOAD Sep 13 00:50:41.056595 kernel: audit: type=1334 audit(1757724640.361:93): prog-id=13 op=LOAD Sep 13 00:50:41.056613 kernel: audit: type=1334 audit(1757724640.373:94): prog-id=14 op=LOAD Sep 13 00:50:41.056627 kernel: audit: type=1334 audit(1757724640.373:95): prog-id=4 op=UNLOAD Sep 13 00:50:41.056641 kernel: audit: type=1334 audit(1757724640.373:96): prog-id=5 op=UNLOAD Sep 13 00:50:41.056656 kernel: audit: type=1131 audit(1757724640.374:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.056671 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:50:41.056686 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:50:41.056702 kernel: audit: type=1334 audit(1757724640.413:98): prog-id=12 op=UNLOAD Sep 13 00:50:41.056719 kernel: audit: type=1130 audit(1757724640.425:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.056734 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:50:41.056750 kernel: audit: type=1131 audit(1757724640.425:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.056765 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:50:41.056780 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:50:41.056795 systemd[1]: Created slice system-getty.slice. Sep 13 00:50:41.056810 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:50:41.056828 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:50:41.056843 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:50:41.056859 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:50:41.056875 systemd[1]: Created slice user.slice. Sep 13 00:50:41.056890 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:50:41.056905 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:50:41.056920 systemd[1]: Set up automount boot.automount. Sep 13 00:50:41.056935 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:50:41.056951 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:50:41.056968 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:50:41.056983 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:50:41.056998 systemd[1]: Reached target integritysetup.target. Sep 13 00:50:41.057014 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:50:41.057029 systemd[1]: Reached target remote-fs.target. Sep 13 00:50:41.057044 systemd[1]: Reached target slices.target. Sep 13 00:50:41.057059 systemd[1]: Reached target swap.target. Sep 13 00:50:41.057074 systemd[1]: Reached target torcx.target. Sep 13 00:50:41.057092 systemd[1]: Reached target veritysetup.target. Sep 13 00:50:41.057107 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:50:41.057122 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:50:41.057145 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:50:41.057161 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:50:41.057179 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:50:41.057194 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:50:41.057211 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:50:41.057227 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:50:41.057242 systemd[1]: Mounting media.mount... Sep 13 00:50:41.057258 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:41.057273 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:50:41.057289 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:50:41.057307 systemd[1]: Mounting tmp.mount... Sep 13 00:50:41.057323 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:50:41.057339 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:50:41.057355 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:50:41.057370 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:50:41.057385 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:50:41.057400 systemd[1]: Starting modprobe@drm.service... Sep 13 00:50:41.057416 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:50:41.057431 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:50:41.057449 systemd[1]: Starting modprobe@loop.service... Sep 13 00:50:41.057465 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:50:41.057480 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:50:41.057496 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:50:41.057511 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:50:41.057527 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:50:41.057544 systemd[1]: Stopped systemd-journald.service. Sep 13 00:50:41.057560 systemd[1]: Starting systemd-journald.service... Sep 13 00:50:41.057575 kernel: loop: module loaded Sep 13 00:50:41.057592 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:50:41.057608 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:50:41.057623 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:50:41.057638 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:50:41.057651 kernel: fuse: init (API version 7.34) Sep 13 00:50:41.057664 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:50:41.057678 systemd[1]: Stopped verity-setup.service. Sep 13 00:50:41.057692 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:41.057705 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:50:41.057721 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:50:41.057734 systemd[1]: Mounted media.mount. Sep 13 00:50:41.057746 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:50:41.057759 systemd-journald[1160]: Journal started Sep 13 00:50:41.060106 systemd-journald[1160]: Runtime Journal (/run/log/journal/65a3fa629ca9446bbcb463de17cc3949) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:50:28.687000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:50:29.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:29.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:50:29.451000 audit: BPF prog-id=10 op=LOAD Sep 13 00:50:29.451000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:50:29.467000 audit: BPF prog-id=11 op=LOAD Sep 13 00:50:29.467000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:50:30.753000 audit[1063]: AVC avc: denied { associate } for pid=1063 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:50:30.753000 audit[1063]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d394 a1=c0000ce6f0 a2=c0000d6c00 a3=32 items=0 ppid=1046 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:30.753000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:50:30.761000 audit[1063]: AVC avc: denied { associate } for pid=1063 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:50:30.761000 audit[1063]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d479 a2=1ed a3=0 items=2 ppid=1046 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:30.761000 audit: CWD cwd="/" Sep 13 00:50:30.761000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:30.761000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:30.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:50:40.349000 audit: BPF prog-id=12 op=LOAD Sep 13 00:50:40.350000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:50:40.361000 audit: BPF prog-id=13 op=LOAD Sep 13 00:50:40.373000 audit: BPF prog-id=14 op=LOAD Sep 13 00:50:40.373000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:50:40.373000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:50:40.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.413000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:50:40.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.935000 audit: BPF prog-id=15 op=LOAD Sep 13 00:50:40.936000 audit: BPF prog-id=16 op=LOAD Sep 13 00:50:40.936000 audit: BPF prog-id=17 op=LOAD Sep 13 00:50:40.936000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:50:40.936000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:50:41.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.053000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:50:41.053000 audit[1160]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffcbfd6d8a0 a2=4000 a3=7ffcbfd6d93c items=0 ppid=1 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:41.053000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:50:40.348293 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:50:30.671845 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:50:40.348306 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:50:30.696601 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:50:40.374578 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:50:30.696620 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:50:30.696653 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:50:30.696663 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:50:30.696700 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:50:30.696711 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:50:30.696897 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:50:30.696926 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:50:30.696936 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:50:30.732251 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:50:30.732313 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:50:30.732340 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:50:30.732357 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:50:30.732386 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:50:30.732399 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:50:37.216785 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:37.217022 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:37.217126 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:37.217289 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:50:37.217331 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:50:37.217380 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2025-09-13T00:50:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:50:41.064167 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:50:41.070166 systemd[1]: Started systemd-journald.service. Sep 13 00:50:41.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.073035 systemd[1]: Mounted tmp.mount. Sep 13 00:50:41.075522 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:50:41.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.078844 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:50:41.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.081730 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:50:41.081874 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:50:41.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.085221 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:50:41.085372 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:50:41.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.088596 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:50:41.088737 systemd[1]: Finished modprobe@drm.service. Sep 13 00:50:41.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.091568 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:50:41.091703 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:50:41.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.094824 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:50:41.094962 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:50:41.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.097847 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:50:41.097993 systemd[1]: Finished modprobe@loop.service. Sep 13 00:50:41.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.101021 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:50:41.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.104249 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:50:41.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.107515 systemd[1]: Reached target network-pre.target. Sep 13 00:50:41.111352 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:50:41.115193 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:50:41.117700 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:50:41.143875 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:50:41.148933 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:50:41.151298 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:50:41.152727 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:50:41.154798 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:50:41.156113 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:50:41.161798 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:50:41.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.164482 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:50:41.167028 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:50:41.171116 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:50:41.192358 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:50:41.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.199724 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:50:41.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.211424 systemd-journald[1160]: Time spent on flushing to /var/log/journal/65a3fa629ca9446bbcb463de17cc3949 is 18.791ms for 1160 entries. Sep 13 00:50:41.211424 systemd-journald[1160]: System Journal (/var/log/journal/65a3fa629ca9446bbcb463de17cc3949) is 8.0M, max 2.6G, 2.6G free. Sep 13 00:50:41.291463 systemd-journald[1160]: Received client request to flush runtime journal. Sep 13 00:50:41.205525 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:50:41.291635 udevadm[1186]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 00:50:41.208242 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:50:41.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.292657 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:50:41.349568 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:50:41.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.884184 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:50:41.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:41.888148 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:50:42.553302 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:50:42.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:42.711060 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:50:42.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:42.714000 audit: BPF prog-id=18 op=LOAD Sep 13 00:50:42.714000 audit: BPF prog-id=19 op=LOAD Sep 13 00:50:42.714000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:50:42.714000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:50:42.715402 systemd[1]: Starting systemd-udevd.service... Sep 13 00:50:42.732775 systemd-udevd[1191]: Using default interface naming scheme 'v252'. Sep 13 00:50:43.777918 systemd[1]: Started systemd-udevd.service. Sep 13 00:50:43.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:43.781000 audit: BPF prog-id=20 op=LOAD Sep 13 00:50:43.782657 systemd[1]: Starting systemd-networkd.service... Sep 13 00:50:43.818201 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:50:43.880169 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:50:43.892000 audit[1192]: AVC avc: denied { confidentiality } for pid=1192 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:50:43.909189 kernel: hv_vmbus: registering driver hv_balloon Sep 13 00:50:43.922156 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 00:50:43.931417 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 00:50:43.931519 kernel: hv_vmbus: registering driver hv_utils Sep 13 00:50:43.935581 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 00:50:43.935000 audit: BPF prog-id=21 op=LOAD Sep 13 00:50:43.935000 audit: BPF prog-id=22 op=LOAD Sep 13 00:50:43.935000 audit: BPF prog-id=23 op=LOAD Sep 13 00:50:43.936504 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:50:43.944161 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 00:50:43.944220 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 00:50:43.955850 kernel: Console: switching to colour dummy device 80x25 Sep 13 00:50:43.959163 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:50:43.980426 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 00:50:43.980511 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 00:50:43.980531 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 00:50:43.892000 audit[1192]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5653b226ba00 a1=f83c a2=7fb2c4aa7bc5 a3=5 items=12 ppid=1191 pid=1192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:43.892000 audit: CWD cwd="/" Sep 13 00:50:43.892000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=1 name=(null) inode=15572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=2 name=(null) inode=15572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=3 name=(null) inode=15573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=4 name=(null) inode=15572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=5 name=(null) inode=15574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=6 name=(null) inode=15572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=7 name=(null) inode=15575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=8 name=(null) inode=15572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=9 name=(null) inode=15576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=10 name=(null) inode=15572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PATH item=11 name=(null) inode=15577 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:43.892000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:50:44.638654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#172 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:50:44.657159 systemd[1]: Started systemd-userdbd.service. Sep 13 00:50:44.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:44.866759 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:50:44.876645 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 13 00:50:44.936035 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:50:44.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:44.940096 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:50:45.213506 lvm[1268]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:50:45.266602 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:50:45.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:45.270035 systemd[1]: Reached target cryptsetup.target. Sep 13 00:50:45.273804 systemd[1]: Starting lvm2-activation.service... Sep 13 00:50:45.278588 lvm[1269]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:50:45.280549 systemd-networkd[1198]: lo: Link UP Sep 13 00:50:45.280562 systemd-networkd[1198]: lo: Gained carrier Sep 13 00:50:45.281179 systemd-networkd[1198]: Enumeration completed Sep 13 00:50:45.281279 systemd[1]: Started systemd-networkd.service. Sep 13 00:50:45.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:45.286010 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:50:45.302638 systemd[1]: Finished lvm2-activation.service. Sep 13 00:50:45.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:45.305320 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:50:45.306695 systemd-networkd[1198]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:50:45.307787 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:50:45.307817 systemd[1]: Reached target local-fs.target. Sep 13 00:50:45.310135 systemd[1]: Reached target machines.target. Sep 13 00:50:45.313696 systemd[1]: Starting ldconfig.service... Sep 13 00:50:45.341770 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:50:45.341853 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:45.342990 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:50:45.346328 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:50:45.350381 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:50:45.354079 systemd[1]: Starting systemd-sysext.service... Sep 13 00:50:45.360679 kernel: mlx5_core a8ee:00:02.0 enP43246s1: Link up Sep 13 00:50:45.364648 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:50:45.397717 kernel: hv_netvsc 7c1e5204-4957-7c1e-5204-49577c1e5204 eth0: Data path switched to VF: enP43246s1 Sep 13 00:50:45.399948 systemd-networkd[1198]: enP43246s1: Link UP Sep 13 00:50:45.401075 systemd-networkd[1198]: eth0: Link UP Sep 13 00:50:45.401560 systemd-networkd[1198]: eth0: Gained carrier Sep 13 00:50:45.406896 systemd-networkd[1198]: enP43246s1: Gained carrier Sep 13 00:50:45.410813 systemd-networkd[1198]: eth0: DHCPv4 address 10.200.4.44/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:50:45.878033 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1272 (bootctl) Sep 13 00:50:45.879411 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:50:45.944407 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:50:45.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:45.951482 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:50:46.001936 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:50:46.002146 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:50:46.058661 kernel: loop0: detected capacity change from 0 to 229808 Sep 13 00:50:46.114662 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:50:46.131649 kernel: loop1: detected capacity change from 0 to 229808 Sep 13 00:50:46.142448 (sd-sysext)[1284]: Using extensions 'kubernetes'. Sep 13 00:50:46.142922 (sd-sysext)[1284]: Merged extensions into '/usr'. Sep 13 00:50:46.158752 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.160157 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:50:46.160531 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.163893 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:50:46.165138 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:50:46.168970 systemd[1]: Starting modprobe@loop.service... Sep 13 00:50:46.169162 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.169317 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:46.169464 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.172395 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:50:46.172585 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:50:46.244395 kernel: kauditd_printk_skb: 69 callbacks suppressed Sep 13 00:50:46.244465 kernel: audit: type=1130 audit(1757724646.172:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.244491 kernel: audit: type=1131 audit(1757724646.172:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.244517 kernel: audit: type=1130 audit(1757724646.173:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.244538 kernel: audit: type=1131 audit(1757724646.173:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.244559 kernel: audit: type=1130 audit(1757724646.192:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.244581 kernel: audit: type=1131 audit(1757724646.192:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.173190 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:50:46.173317 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:50:46.174390 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:50:46.192666 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:50:46.192819 systemd[1]: Finished modprobe@loop.service. Sep 13 00:50:46.193209 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.282323 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:50:46.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.284062 systemd[1]: Finished systemd-sysext.service. Sep 13 00:50:46.286315 systemd[1]: Starting ensure-sysext.service... Sep 13 00:50:46.293401 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:50:46.305652 kernel: audit: type=1130 audit(1757724646.283:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.307460 systemd[1]: Reloading. Sep 13 00:50:46.331458 systemd-tmpfiles[1291]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:50:46.361447 systemd-tmpfiles[1291]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:50:46.377004 systemd-tmpfiles[1291]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:50:46.380746 /usr/lib/systemd/system-generators/torcx-generator[1313]: time="2025-09-13T00:50:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:50:46.380778 /usr/lib/systemd/system-generators/torcx-generator[1313]: time="2025-09-13T00:50:46Z" level=info msg="torcx already run" Sep 13 00:50:46.459389 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:50:46.459410 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:50:46.474354 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:50:46.528520 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:50:46.530000 audit: BPF prog-id=24 op=LOAD Sep 13 00:50:46.542162 kernel: audit: type=1334 audit(1757724646.530:160): prog-id=24 op=LOAD Sep 13 00:50:46.542235 kernel: audit: type=1334 audit(1757724646.530:161): prog-id=20 op=UNLOAD Sep 13 00:50:46.530000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:50:46.547546 kernel: audit: type=1334 audit(1757724646.535:162): prog-id=25 op=LOAD Sep 13 00:50:46.535000 audit: BPF prog-id=25 op=LOAD Sep 13 00:50:46.535000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:50:46.535000 audit: BPF prog-id=26 op=LOAD Sep 13 00:50:46.535000 audit: BPF prog-id=27 op=LOAD Sep 13 00:50:46.535000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:50:46.535000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:50:46.541000 audit: BPF prog-id=28 op=LOAD Sep 13 00:50:46.541000 audit: BPF prog-id=29 op=LOAD Sep 13 00:50:46.541000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:50:46.541000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:50:46.546000 audit: BPF prog-id=30 op=LOAD Sep 13 00:50:46.546000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:50:46.547000 audit: BPF prog-id=31 op=LOAD Sep 13 00:50:46.547000 audit: BPF prog-id=32 op=LOAD Sep 13 00:50:46.547000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:50:46.547000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:50:46.554916 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:50:46.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.565668 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.565889 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.567162 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:50:46.570711 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:50:46.574237 systemd[1]: Starting modprobe@loop.service... Sep 13 00:50:46.576699 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.576853 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:46.576985 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.577878 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:50:46.578024 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:50:46.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.581070 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:50:46.581223 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:50:46.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.584236 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:50:46.584374 systemd[1]: Finished modprobe@loop.service. Sep 13 00:50:46.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.588261 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:50:46.588367 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.593585 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.594488 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.597654 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:50:46.601477 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:50:46.606017 systemd[1]: Starting modprobe@loop.service... Sep 13 00:50:46.608737 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.608909 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:46.609065 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.610827 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:50:46.611002 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:50:46.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.613972 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:50:46.614077 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:50:46.614471 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:50:46.614576 systemd[1]: Finished modprobe@loop.service. Sep 13 00:50:46.614923 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:50:46.615002 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.621255 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.621472 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.622769 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:50:46.625158 systemd[1]: Starting modprobe@drm.service... Sep 13 00:50:46.627810 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:50:46.629569 systemd[1]: Starting modprobe@loop.service... Sep 13 00:50:46.630251 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.630380 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:46.630562 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:50:46.632564 systemd[1]: Finished ensure-sysext.service. Sep 13 00:50:46.636943 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:50:46.637305 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:50:46.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.638975 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:50:46.639198 systemd[1]: Finished modprobe@loop.service. Sep 13 00:50:46.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.640681 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:50:46.642309 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:50:46.642822 systemd[1]: Finished modprobe@drm.service. Sep 13 00:50:46.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.645661 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:50:46.645800 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:50:46.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:46.649329 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:50:46.929764 systemd-networkd[1198]: eth0: Gained IPv6LL Sep 13 00:50:46.934426 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:50:46.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:47.229455 systemd-fsck[1280]: fsck.fat 4.2 (2021-01-31) Sep 13 00:50:47.229455 systemd-fsck[1280]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:50:47.231576 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:50:47.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:47.236823 systemd[1]: Mounting boot.mount... Sep 13 00:50:47.250358 systemd[1]: Mounted boot.mount. Sep 13 00:50:47.267020 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:50:47.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.069216 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:50:49.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.073559 systemd[1]: Starting audit-rules.service... Sep 13 00:50:49.076806 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:50:49.080426 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:50:49.083000 audit: BPF prog-id=33 op=LOAD Sep 13 00:50:49.085114 systemd[1]: Starting systemd-resolved.service... Sep 13 00:50:49.090000 audit: BPF prog-id=34 op=LOAD Sep 13 00:50:49.091751 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:50:49.095274 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:50:49.113000 audit[1395]: SYSTEM_BOOT pid=1395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.118135 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:50:49.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.151011 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:50:49.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.154271 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:50:49.237909 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:50:49.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.240945 systemd[1]: Reached target time-set.target. Sep 13 00:50:49.267327 systemd-resolved[1393]: Positive Trust Anchors: Sep 13 00:50:49.267346 systemd-resolved[1393]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:50:49.267388 systemd-resolved[1393]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:50:49.401055 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:50:49.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.463244 systemd-resolved[1393]: Using system hostname 'ci-3510.3.8-n-99e6272c46'. Sep 13 00:50:49.464725 systemd[1]: Started systemd-resolved.service. Sep 13 00:50:49.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:49.467672 systemd[1]: Reached target network.target. Sep 13 00:50:49.470145 systemd[1]: Reached target network-online.target. Sep 13 00:50:49.472882 systemd[1]: Reached target nss-lookup.target. Sep 13 00:50:49.509222 systemd-timesyncd[1394]: Contacted time server 82.30.218.44:123 (0.flatcar.pool.ntp.org). Sep 13 00:50:49.509363 systemd-timesyncd[1394]: Initial clock synchronization to Sat 2025-09-13 00:50:49.506878 UTC. Sep 13 00:50:49.514000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:50:49.514000 audit[1411]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc749a830 a2=420 a3=0 items=0 ppid=1390 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:49.514000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:50:49.515650 augenrules[1411]: No rules Sep 13 00:50:49.516450 systemd[1]: Finished audit-rules.service. Sep 13 00:50:54.550276 ldconfig[1271]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:50:54.560489 systemd[1]: Finished ldconfig.service. Sep 13 00:50:54.564965 systemd[1]: Starting systemd-update-done.service... Sep 13 00:50:54.583192 systemd[1]: Finished systemd-update-done.service. Sep 13 00:50:54.586030 systemd[1]: Reached target sysinit.target. Sep 13 00:50:54.588601 systemd[1]: Started motdgen.path. Sep 13 00:50:54.590989 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:50:54.594558 systemd[1]: Started logrotate.timer. Sep 13 00:50:54.596709 systemd[1]: Started mdadm.timer. Sep 13 00:50:54.598705 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:50:54.601346 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:50:54.601381 systemd[1]: Reached target paths.target. Sep 13 00:50:54.603752 systemd[1]: Reached target timers.target. Sep 13 00:50:54.606503 systemd[1]: Listening on dbus.socket. Sep 13 00:50:54.610106 systemd[1]: Starting docker.socket... Sep 13 00:50:54.639231 systemd[1]: Listening on sshd.socket. Sep 13 00:50:54.642200 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:54.642672 systemd[1]: Listening on docker.socket. Sep 13 00:50:54.645232 systemd[1]: Reached target sockets.target. Sep 13 00:50:54.647756 systemd[1]: Reached target basic.target. Sep 13 00:50:54.650188 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:50:54.650222 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:50:54.651291 systemd[1]: Starting containerd.service... Sep 13 00:50:54.654798 systemd[1]: Starting dbus.service... Sep 13 00:50:54.657944 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:50:54.661697 systemd[1]: Starting extend-filesystems.service... Sep 13 00:50:54.664283 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:50:54.687023 systemd[1]: Starting kubelet.service... Sep 13 00:50:54.690513 systemd[1]: Starting motdgen.service... Sep 13 00:50:54.693886 systemd[1]: Started nvidia.service. Sep 13 00:50:54.717815 systemd[1]: Starting prepare-helm.service... Sep 13 00:50:54.721541 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:50:54.725394 systemd[1]: Starting sshd-keygen.service... Sep 13 00:50:54.731104 systemd[1]: Starting systemd-logind.service... Sep 13 00:50:54.734700 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:50:54.734785 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:50:54.735370 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:50:54.736826 systemd[1]: Starting update-engine.service... Sep 13 00:50:54.742452 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:50:54.761031 jq[1421]: false Sep 13 00:50:54.761015 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:50:54.761378 jq[1435]: true Sep 13 00:50:54.761267 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:50:54.765343 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:50:54.765565 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:50:54.789220 jq[1443]: true Sep 13 00:50:54.821572 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:50:54.821827 systemd[1]: Finished motdgen.service. Sep 13 00:50:54.825241 extend-filesystems[1422]: Found loop1 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda1 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda2 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda3 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found usr Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda4 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda6 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda7 Sep 13 00:50:54.828964 extend-filesystems[1422]: Found sda9 Sep 13 00:50:54.828964 extend-filesystems[1422]: Checking size of /dev/sda9 Sep 13 00:50:54.893360 systemd-logind[1433]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:50:54.898846 systemd-logind[1433]: New seat seat0. Sep 13 00:50:54.905245 tar[1440]: linux-amd64/LICENSE Sep 13 00:50:54.905541 tar[1440]: linux-amd64/helm Sep 13 00:50:54.911618 env[1460]: time="2025-09-13T00:50:54.911569722Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:50:54.924731 extend-filesystems[1422]: Old size kept for /dev/sda9 Sep 13 00:50:54.928218 extend-filesystems[1422]: Found sr0 Sep 13 00:50:54.931732 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:50:54.931924 systemd[1]: Finished extend-filesystems.service. Sep 13 00:50:54.953148 bash[1459]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:50:54.954181 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:50:54.992032 env[1460]: time="2025-09-13T00:50:54.991984320Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:50:54.994829 env[1460]: time="2025-09-13T00:50:54.994793017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:50:54.996689 env[1460]: time="2025-09-13T00:50:54.996651415Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:50:54.996805 env[1460]: time="2025-09-13T00:50:54.996789700Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:50:54.997097 env[1460]: time="2025-09-13T00:50:54.997074070Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:50:54.997175 env[1460]: time="2025-09-13T00:50:54.997162160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:50:54.997237 env[1460]: time="2025-09-13T00:50:54.997223154Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:50:54.997294 env[1460]: time="2025-09-13T00:50:54.997281847Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:50:54.997428 env[1460]: time="2025-09-13T00:50:54.997414133Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:50:54.997744 env[1460]: time="2025-09-13T00:50:54.997725799Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:50:55.000018 env[1460]: time="2025-09-13T00:50:54.999991154Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:50:55.000112 env[1460]: time="2025-09-13T00:50:55.000098142Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:50:55.000225 env[1460]: time="2025-09-13T00:50:55.000210030Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:50:55.000325 env[1460]: time="2025-09-13T00:50:55.000314519Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:50:55.016272 env[1460]: time="2025-09-13T00:50:55.016225196Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:50:55.016394 env[1460]: time="2025-09-13T00:50:55.016280690Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:50:55.016394 env[1460]: time="2025-09-13T00:50:55.016300888Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:50:55.016394 env[1460]: time="2025-09-13T00:50:55.016341584Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016394 env[1460]: time="2025-09-13T00:50:55.016360982Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016394 env[1460]: time="2025-09-13T00:50:55.016380780Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016573 env[1460]: time="2025-09-13T00:50:55.016397579Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016573 env[1460]: time="2025-09-13T00:50:55.016419476Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016573 env[1460]: time="2025-09-13T00:50:55.016438774Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016573 env[1460]: time="2025-09-13T00:50:55.016459772Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016573 env[1460]: time="2025-09-13T00:50:55.016478670Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.016573 env[1460]: time="2025-09-13T00:50:55.016499968Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:50:55.020355 env[1460]: time="2025-09-13T00:50:55.016661952Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:50:55.020511 env[1460]: time="2025-09-13T00:50:55.020488463Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:50:55.020877 env[1460]: time="2025-09-13T00:50:55.020853426Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:50:55.020943 env[1460]: time="2025-09-13T00:50:55.020895722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.020943 env[1460]: time="2025-09-13T00:50:55.020916520Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:50:55.021005 env[1460]: time="2025-09-13T00:50:55.020982513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021044 env[1460]: time="2025-09-13T00:50:55.021001311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021044 env[1460]: time="2025-09-13T00:50:55.021018810Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021044 env[1460]: time="2025-09-13T00:50:55.021036408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021133 env[1460]: time="2025-09-13T00:50:55.021053906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021133 env[1460]: time="2025-09-13T00:50:55.021072604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021133 env[1460]: time="2025-09-13T00:50:55.021088503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021133 env[1460]: time="2025-09-13T00:50:55.021104701Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021133 env[1460]: time="2025-09-13T00:50:55.021125099Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:50:55.021297 env[1460]: time="2025-09-13T00:50:55.021266185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021297 env[1460]: time="2025-09-13T00:50:55.021285783Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021370 env[1460]: time="2025-09-13T00:50:55.021303481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021370 env[1460]: time="2025-09-13T00:50:55.021321079Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:50:55.021370 env[1460]: time="2025-09-13T00:50:55.021341477Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:50:55.021370 env[1460]: time="2025-09-13T00:50:55.021361475Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:50:55.021487 env[1460]: time="2025-09-13T00:50:55.021384873Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:50:55.021487 env[1460]: time="2025-09-13T00:50:55.021428468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:50:55.021800 env[1460]: time="2025-09-13T00:50:55.021721838Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.021817929Z" level=info msg="Connect containerd service" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.021867424Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.026368667Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.026737430Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.026795524Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.026857017Z" level=info msg="containerd successfully booted in 0.119942s" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.030154783Z" level=info msg="Start subscribing containerd event" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.030220076Z" level=info msg="Start recovering state" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.030301468Z" level=info msg="Start event monitor" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.030320466Z" level=info msg="Start snapshots syncer" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.030333965Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:50:55.050595 env[1460]: time="2025-09-13T00:50:55.030350463Z" level=info msg="Start streaming server" Sep 13 00:50:55.026942 systemd[1]: Started containerd.service. Sep 13 00:50:55.106528 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:50:55.402459 dbus-daemon[1420]: [system] SELinux support is enabled Sep 13 00:50:55.402645 systemd[1]: Started dbus.service. Sep 13 00:50:55.408028 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:50:55.408060 systemd[1]: Reached target system-config.target. Sep 13 00:50:55.410696 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:50:55.410721 systemd[1]: Reached target user-config.target. Sep 13 00:50:55.413969 systemd[1]: Started systemd-logind.service. Sep 13 00:50:55.414265 dbus-daemon[1420]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:50:55.639395 update_engine[1434]: I0913 00:50:55.626452 1434 main.cc:92] Flatcar Update Engine starting Sep 13 00:50:55.695138 systemd[1]: Started update-engine.service. Sep 13 00:50:55.698619 update_engine[1434]: I0913 00:50:55.695497 1434 update_check_scheduler.cc:74] Next update check in 3m17s Sep 13 00:50:55.700144 systemd[1]: Started locksmithd.service. Sep 13 00:50:55.875875 tar[1440]: linux-amd64/README.md Sep 13 00:50:55.882761 systemd[1]: Finished prepare-helm.service. Sep 13 00:50:56.282503 systemd[1]: Started kubelet.service. Sep 13 00:50:56.390756 sshd_keygen[1442]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:50:56.419750 systemd[1]: Finished sshd-keygen.service. Sep 13 00:50:56.424387 systemd[1]: Starting issuegen.service... Sep 13 00:50:56.428240 systemd[1]: Started waagent.service. Sep 13 00:50:56.431871 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:50:56.432036 systemd[1]: Finished issuegen.service. Sep 13 00:50:56.436288 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:50:56.460555 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:50:56.465588 systemd[1]: Started getty@tty1.service. Sep 13 00:50:56.470205 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:50:56.473869 systemd[1]: Reached target getty.target. Sep 13 00:50:56.477254 systemd[1]: Reached target multi-user.target. Sep 13 00:50:56.482001 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:50:56.490925 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:50:56.491121 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:50:56.494129 systemd[1]: Startup finished in 973ms (kernel) + 12.488s (initrd) + 27.669s (userspace) = 41.131s. Sep 13 00:50:56.928763 kubelet[1528]: E0913 00:50:56.928719 1528 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:50:56.930229 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:50:56.930395 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:50:56.930668 systemd[1]: kubelet.service: Consumed 1.146s CPU time. Sep 13 00:50:57.148918 login[1551]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:50:57.150311 login[1552]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:50:57.189003 locksmithd[1524]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:50:57.272455 systemd[1]: Created slice user-500.slice. Sep 13 00:50:57.273898 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:50:57.276484 systemd-logind[1433]: New session 2 of user core. Sep 13 00:50:57.279384 systemd-logind[1433]: New session 1 of user core. Sep 13 00:50:57.308746 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:50:57.310382 systemd[1]: Starting user@500.service... Sep 13 00:50:57.338416 (systemd)[1555]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:50:57.708789 systemd[1555]: Queued start job for default target default.target. Sep 13 00:50:57.709383 systemd[1555]: Reached target paths.target. Sep 13 00:50:57.709411 systemd[1555]: Reached target sockets.target. Sep 13 00:50:57.709427 systemd[1555]: Reached target timers.target. Sep 13 00:50:57.709441 systemd[1555]: Reached target basic.target. Sep 13 00:50:57.709557 systemd[1]: Started user@500.service. Sep 13 00:50:57.710705 systemd[1]: Started session-1.scope. Sep 13 00:50:57.711360 systemd[1555]: Reached target default.target. Sep 13 00:50:57.711440 systemd[1]: Started session-2.scope. Sep 13 00:50:57.711566 systemd[1555]: Startup finished in 366ms. Sep 13 00:51:05.635738 waagent[1545]: 2025-09-13T00:51:05.635615Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 00:51:05.676372 waagent[1545]: 2025-09-13T00:51:05.662214Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 00:51:05.676372 waagent[1545]: 2025-09-13T00:51:05.663325Z INFO Daemon Daemon Python: 3.9.16 Sep 13 00:51:05.676372 waagent[1545]: 2025-09-13T00:51:05.664703Z INFO Daemon Daemon Run daemon Sep 13 00:51:05.676372 waagent[1545]: 2025-09-13T00:51:05.665713Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 00:51:05.688059 waagent[1545]: 2025-09-13T00:51:05.687925Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:51:05.696268 waagent[1545]: 2025-09-13T00:51:05.696132Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.696680Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.697576Z INFO Daemon Daemon Using waagent for provisioning Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.699224Z INFO Daemon Daemon Activate resource disk Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.700323Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.709335Z INFO Daemon Daemon Found device: None Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.710652Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.711719Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.713870Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.714932Z INFO Daemon Daemon Running default provisioning handler Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.725146Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.728792Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.729833Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:51:05.749751 waagent[1545]: 2025-09-13T00:51:05.730862Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 00:51:05.866783 waagent[1545]: 2025-09-13T00:51:05.866610Z INFO Daemon Daemon Successfully mounted dvd Sep 13 00:51:05.935230 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 00:51:05.967308 waagent[1545]: 2025-09-13T00:51:05.967171Z INFO Daemon Daemon Detect protocol endpoint Sep 13 00:51:05.983960 waagent[1545]: 2025-09-13T00:51:05.967701Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:51:05.983960 waagent[1545]: 2025-09-13T00:51:05.968954Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 00:51:05.983960 waagent[1545]: 2025-09-13T00:51:05.969838Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 00:51:05.983960 waagent[1545]: 2025-09-13T00:51:05.971052Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 00:51:05.983960 waagent[1545]: 2025-09-13T00:51:05.972408Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 00:51:06.113930 waagent[1545]: 2025-09-13T00:51:06.113856Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 00:51:06.122951 waagent[1545]: 2025-09-13T00:51:06.114823Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 00:51:06.122951 waagent[1545]: 2025-09-13T00:51:06.115868Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 00:51:06.524962 waagent[1545]: 2025-09-13T00:51:06.524819Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 00:51:06.536446 waagent[1545]: 2025-09-13T00:51:06.536367Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 00:51:06.540605 waagent[1545]: 2025-09-13T00:51:06.540540Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 00:51:06.615555 waagent[1545]: 2025-09-13T00:51:06.615431Z INFO Daemon Daemon Found private key matching thumbprint 19065FD6F6047182F797BD51D0D9BB7D814CF814 Sep 13 00:51:06.623190 waagent[1545]: 2025-09-13T00:51:06.616027Z INFO Daemon Daemon Fetch goal state completed Sep 13 00:51:06.653041 waagent[1545]: 2025-09-13T00:51:06.652974Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: f4bd23c5-1a71-493e-871f-97c74c7573b9 New eTag: 15708498350817163857] Sep 13 00:51:06.662022 waagent[1545]: 2025-09-13T00:51:06.653865Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:51:06.663724 waagent[1545]: 2025-09-13T00:51:06.663670Z INFO Daemon Daemon Starting provisioning Sep 13 00:51:06.672184 waagent[1545]: 2025-09-13T00:51:06.663961Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 00:51:06.672184 waagent[1545]: 2025-09-13T00:51:06.665386Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-99e6272c46] Sep 13 00:51:06.681654 waagent[1545]: 2025-09-13T00:51:06.681527Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-99e6272c46] Sep 13 00:51:06.690645 waagent[1545]: 2025-09-13T00:51:06.682247Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 00:51:06.690645 waagent[1545]: 2025-09-13T00:51:06.683374Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 00:51:06.696642 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 00:51:06.696863 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 00:51:06.696933 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 00:51:06.697270 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:51:06.702683 systemd-networkd[1198]: eth0: DHCPv6 lease lost Sep 13 00:51:06.703951 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:51:06.704154 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:51:06.706314 systemd[1]: Starting systemd-networkd.service... Sep 13 00:51:06.736609 systemd-networkd[1596]: enP43246s1: Link UP Sep 13 00:51:06.736620 systemd-networkd[1596]: enP43246s1: Gained carrier Sep 13 00:51:06.738091 systemd-networkd[1596]: eth0: Link UP Sep 13 00:51:06.738100 systemd-networkd[1596]: eth0: Gained carrier Sep 13 00:51:06.738506 systemd-networkd[1596]: lo: Link UP Sep 13 00:51:06.738515 systemd-networkd[1596]: lo: Gained carrier Sep 13 00:51:06.738871 systemd-networkd[1596]: eth0: Gained IPv6LL Sep 13 00:51:06.739137 systemd-networkd[1596]: Enumeration completed Sep 13 00:51:06.742900 waagent[1545]: 2025-09-13T00:51:06.740448Z INFO Daemon Daemon Create user account if not exists Sep 13 00:51:06.742900 waagent[1545]: 2025-09-13T00:51:06.741118Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 00:51:06.742900 waagent[1545]: 2025-09-13T00:51:06.741564Z INFO Daemon Daemon Configure sudoer Sep 13 00:51:06.739251 systemd[1]: Started systemd-networkd.service. Sep 13 00:51:06.747545 systemd-networkd[1596]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:51:06.750265 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:51:06.756155 waagent[1545]: 2025-09-13T00:51:06.756064Z INFO Daemon Daemon Configure sshd Sep 13 00:51:06.759321 waagent[1545]: 2025-09-13T00:51:06.759247Z INFO Daemon Daemon Deploy ssh public key. Sep 13 00:51:06.759755 systemd-networkd[1596]: eth0: DHCPv4 address 10.200.4.44/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:51:06.762217 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:51:07.041470 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:51:07.041738 systemd[1]: Stopped kubelet.service. Sep 13 00:51:07.041783 systemd[1]: kubelet.service: Consumed 1.146s CPU time. Sep 13 00:51:07.043214 systemd[1]: Starting kubelet.service... Sep 13 00:51:07.136143 systemd[1]: Started kubelet.service. Sep 13 00:51:07.841718 kubelet[1606]: E0913 00:51:07.841670 1606 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:07.844766 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:07.844931 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:07.897928 waagent[1545]: 2025-09-13T00:51:07.897851Z INFO Daemon Daemon Provisioning complete Sep 13 00:51:07.913473 waagent[1545]: 2025-09-13T00:51:07.913397Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 00:51:07.917428 waagent[1545]: 2025-09-13T00:51:07.917353Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 00:51:07.923530 waagent[1545]: 2025-09-13T00:51:07.923454Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 00:51:08.200652 waagent[1612]: 2025-09-13T00:51:08.200458Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 00:51:08.201390 waagent[1612]: 2025-09-13T00:51:08.201321Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:08.201534 waagent[1612]: 2025-09-13T00:51:08.201479Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:08.212526 waagent[1612]: 2025-09-13T00:51:08.212434Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 00:51:08.212723 waagent[1612]: 2025-09-13T00:51:08.212662Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 00:51:08.260199 waagent[1612]: 2025-09-13T00:51:08.260075Z INFO ExtHandler ExtHandler Found private key matching thumbprint 19065FD6F6047182F797BD51D0D9BB7D814CF814 Sep 13 00:51:08.260507 waagent[1612]: 2025-09-13T00:51:08.260447Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 00:51:08.275601 waagent[1612]: 2025-09-13T00:51:08.275535Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: ee8bd154-4cbd-4b60-971c-9ff4b8dcb8f9 New eTag: 15708498350817163857] Sep 13 00:51:08.276160 waagent[1612]: 2025-09-13T00:51:08.276104Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:51:08.384863 waagent[1612]: 2025-09-13T00:51:08.384726Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:51:08.405966 waagent[1612]: 2025-09-13T00:51:08.405868Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1612 Sep 13 00:51:08.409387 waagent[1612]: 2025-09-13T00:51:08.409308Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:51:08.410561 waagent[1612]: 2025-09-13T00:51:08.410500Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 00:51:08.522430 waagent[1612]: 2025-09-13T00:51:08.522316Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:51:08.522798 waagent[1612]: 2025-09-13T00:51:08.522745Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:51:08.530304 waagent[1612]: 2025-09-13T00:51:08.530243Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:51:08.530811 waagent[1612]: 2025-09-13T00:51:08.530754Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:51:08.531868 waagent[1612]: 2025-09-13T00:51:08.531809Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 00:51:08.533098 waagent[1612]: 2025-09-13T00:51:08.533043Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:51:08.533507 waagent[1612]: 2025-09-13T00:51:08.533454Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:08.533686 waagent[1612]: 2025-09-13T00:51:08.533612Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:08.534566 waagent[1612]: 2025-09-13T00:51:08.534513Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:51:08.534758 waagent[1612]: 2025-09-13T00:51:08.534688Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:51:08.535347 waagent[1612]: 2025-09-13T00:51:08.535288Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:51:08.535551 waagent[1612]: 2025-09-13T00:51:08.535499Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:51:08.535834 waagent[1612]: 2025-09-13T00:51:08.535782Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:51:08.535834 waagent[1612]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:51:08.535834 waagent[1612]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:51:08.535834 waagent[1612]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:51:08.535834 waagent[1612]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:08.535834 waagent[1612]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:08.535834 waagent[1612]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:08.538647 waagent[1612]: 2025-09-13T00:51:08.538484Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:51:08.539003 waagent[1612]: 2025-09-13T00:51:08.538933Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:08.539171 waagent[1612]: 2025-09-13T00:51:08.539117Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:51:08.539458 waagent[1612]: 2025-09-13T00:51:08.539391Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:51:08.540028 waagent[1612]: 2025-09-13T00:51:08.539975Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:08.541785 waagent[1612]: 2025-09-13T00:51:08.541725Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:51:08.542257 waagent[1612]: 2025-09-13T00:51:08.542211Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:51:08.543690 waagent[1612]: 2025-09-13T00:51:08.543620Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:51:08.555130 waagent[1612]: 2025-09-13T00:51:08.555072Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 00:51:08.555704 waagent[1612]: 2025-09-13T00:51:08.555651Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:51:08.556499 waagent[1612]: 2025-09-13T00:51:08.556445Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 00:51:08.590384 waagent[1612]: 2025-09-13T00:51:08.590304Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 00:51:08.601096 waagent[1612]: 2025-09-13T00:51:08.601023Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1596' Sep 13 00:51:08.693663 waagent[1612]: 2025-09-13T00:51:08.693513Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:51:08.693663 waagent[1612]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:51:08.693663 waagent[1612]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:51:08.693663 waagent[1612]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:04:49:57 brd ff:ff:ff:ff:ff:ff Sep 13 00:51:08.693663 waagent[1612]: 3: enP43246s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:04:49:57 brd ff:ff:ff:ff:ff:ff\ altname enP43246p0s2 Sep 13 00:51:08.693663 waagent[1612]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:51:08.693663 waagent[1612]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:51:08.693663 waagent[1612]: 2: eth0 inet 10.200.4.44/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:51:08.693663 waagent[1612]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:51:08.693663 waagent[1612]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:51:08.693663 waagent[1612]: 2: eth0 inet6 fe80::7e1e:52ff:fe04:4957/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:51:08.853192 waagent[1612]: 2025-09-13T00:51:08.853122Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 00:51:08.926785 waagent[1545]: 2025-09-13T00:51:08.926663Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 00:51:08.932863 waagent[1545]: 2025-09-13T00:51:08.932807Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 00:51:10.080420 waagent[1643]: 2025-09-13T00:51:10.080312Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 00:51:10.081155 waagent[1643]: 2025-09-13T00:51:10.081087Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 00:51:10.081315 waagent[1643]: 2025-09-13T00:51:10.081264Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 00:51:10.081463 waagent[1643]: 2025-09-13T00:51:10.081418Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 13 00:51:10.096140 waagent[1643]: 2025-09-13T00:51:10.096027Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:51:10.096568 waagent[1643]: 2025-09-13T00:51:10.096509Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:10.096761 waagent[1643]: 2025-09-13T00:51:10.096712Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:10.096994 waagent[1643]: 2025-09-13T00:51:10.096946Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 00:51:10.108687 waagent[1643]: 2025-09-13T00:51:10.108596Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 00:51:10.116743 waagent[1643]: 2025-09-13T00:51:10.116681Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.177 Sep 13 00:51:10.117696 waagent[1643]: 2025-09-13T00:51:10.117621Z INFO ExtHandler Sep 13 00:51:10.117870 waagent[1643]: 2025-09-13T00:51:10.117821Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 64366c24-c695-4822-8376-90899106e356 eTag: 15708498350817163857 source: Fabric] Sep 13 00:51:10.118544 waagent[1643]: 2025-09-13T00:51:10.118486Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 00:51:10.119638 waagent[1643]: 2025-09-13T00:51:10.119568Z INFO ExtHandler Sep 13 00:51:10.119793 waagent[1643]: 2025-09-13T00:51:10.119745Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 00:51:10.125597 waagent[1643]: 2025-09-13T00:51:10.125541Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 00:51:10.126080 waagent[1643]: 2025-09-13T00:51:10.126031Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:51:10.143021 waagent[1643]: 2025-09-13T00:51:10.142960Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 00:51:10.212656 waagent[1643]: 2025-09-13T00:51:10.212518Z INFO ExtHandler Downloaded certificate {'thumbprint': '19065FD6F6047182F797BD51D0D9BB7D814CF814', 'hasPrivateKey': True} Sep 13 00:51:10.213873 waagent[1643]: 2025-09-13T00:51:10.213805Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 00:51:10.214707 waagent[1643]: 2025-09-13T00:51:10.214644Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 00:51:10.231451 waagent[1643]: 2025-09-13T00:51:10.231342Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 00:51:10.239264 waagent[1643]: 2025-09-13T00:51:10.239162Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:51:10.242759 waagent[1643]: 2025-09-13T00:51:10.242624Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 00:51:10.242992 waagent[1643]: 2025-09-13T00:51:10.242938Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 00:51:10.371686 waagent[1643]: 2025-09-13T00:51:10.371463Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Sep 13 00:51:10.371686 waagent[1643]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:51:10.371686 waagent[1643]: pkts bytes target prot opt in out source destination Sep 13 00:51:10.371686 waagent[1643]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:51:10.371686 waagent[1643]: pkts bytes target prot opt in out source destination Sep 13 00:51:10.371686 waagent[1643]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:51:10.371686 waagent[1643]: pkts bytes target prot opt in out source destination Sep 13 00:51:10.371686 waagent[1643]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 00:51:10.371686 waagent[1643]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:51:10.371686 waagent[1643]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:51:10.372748 waagent[1643]: 2025-09-13T00:51:10.372685Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 00:51:10.375266 waagent[1643]: 2025-09-13T00:51:10.375160Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 00:51:10.375531 waagent[1643]: 2025-09-13T00:51:10.375479Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:51:10.375936 waagent[1643]: 2025-09-13T00:51:10.375880Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:51:10.383484 waagent[1643]: 2025-09-13T00:51:10.383424Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:51:10.384015 waagent[1643]: 2025-09-13T00:51:10.383960Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:51:10.391396 waagent[1643]: 2025-09-13T00:51:10.391323Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1643 Sep 13 00:51:10.394375 waagent[1643]: 2025-09-13T00:51:10.394309Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:51:10.395148 waagent[1643]: 2025-09-13T00:51:10.395089Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 00:51:10.395955 waagent[1643]: 2025-09-13T00:51:10.395899Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 00:51:10.398342 waagent[1643]: 2025-09-13T00:51:10.398281Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 00:51:10.398698 waagent[1643]: 2025-09-13T00:51:10.398618Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 00:51:10.399943 waagent[1643]: 2025-09-13T00:51:10.399890Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:51:10.400355 waagent[1643]: 2025-09-13T00:51:10.400301Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:10.400512 waagent[1643]: 2025-09-13T00:51:10.400467Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:10.401037 waagent[1643]: 2025-09-13T00:51:10.400989Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:51:10.401345 waagent[1643]: 2025-09-13T00:51:10.401294Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:51:10.401345 waagent[1643]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:51:10.401345 waagent[1643]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:51:10.401345 waagent[1643]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:51:10.401345 waagent[1643]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:10.401345 waagent[1643]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:10.401345 waagent[1643]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:51:10.404335 waagent[1643]: 2025-09-13T00:51:10.404235Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:51:10.405033 waagent[1643]: 2025-09-13T00:51:10.404971Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:51:10.405558 waagent[1643]: 2025-09-13T00:51:10.405487Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:51:10.405670 waagent[1643]: 2025-09-13T00:51:10.404700Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:51:10.408441 waagent[1643]: 2025-09-13T00:51:10.408340Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:51:10.408888 waagent[1643]: 2025-09-13T00:51:10.408818Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:51:10.409062 waagent[1643]: 2025-09-13T00:51:10.409009Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:51:10.409273 waagent[1643]: 2025-09-13T00:51:10.409214Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:51:10.415813 waagent[1643]: 2025-09-13T00:51:10.415590Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:51:10.416085 waagent[1643]: 2025-09-13T00:51:10.415994Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:51:10.418601 waagent[1643]: 2025-09-13T00:51:10.418534Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:51:10.423517 waagent[1643]: 2025-09-13T00:51:10.421813Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:51:10.423517 waagent[1643]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:51:10.423517 waagent[1643]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:51:10.423517 waagent[1643]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:04:49:57 brd ff:ff:ff:ff:ff:ff Sep 13 00:51:10.423517 waagent[1643]: 3: enP43246s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:04:49:57 brd ff:ff:ff:ff:ff:ff\ altname enP43246p0s2 Sep 13 00:51:10.423517 waagent[1643]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:51:10.423517 waagent[1643]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:51:10.423517 waagent[1643]: 2: eth0 inet 10.200.4.44/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:51:10.423517 waagent[1643]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:51:10.423517 waagent[1643]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:51:10.423517 waagent[1643]: 2: eth0 inet6 fe80::7e1e:52ff:fe04:4957/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:51:10.433084 waagent[1643]: 2025-09-13T00:51:10.433022Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 00:51:10.456666 waagent[1643]: 2025-09-13T00:51:10.456580Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:51:10.461950 waagent[1643]: 2025-09-13T00:51:10.461880Z INFO ExtHandler ExtHandler Sep 13 00:51:10.465464 waagent[1643]: 2025-09-13T00:51:10.465213Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d7f3bed8-59b5-43ee-99e8-b645943e8324 correlation 20a1f3cb-491b-44d6-ba40-f4f6669c44de created: 2025-09-13T00:49:40.334198Z] Sep 13 00:51:10.467469 waagent[1643]: 2025-09-13T00:51:10.467407Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 00:51:10.472450 waagent[1643]: 2025-09-13T00:51:10.472395Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 10 ms] Sep 13 00:51:10.484149 waagent[1643]: 2025-09-13T00:51:10.484082Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 00:51:10.514097 waagent[1643]: 2025-09-13T00:51:10.514034Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 00:51:10.516481 waagent[1643]: 2025-09-13T00:51:10.516414Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 914B261D-93AA-4A52-B78D-A62C16CC0022;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 00:51:18.041394 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:51:18.041652 systemd[1]: Stopped kubelet.service. Sep 13 00:51:18.043146 systemd[1]: Starting kubelet.service... Sep 13 00:51:18.133788 systemd[1]: Started kubelet.service. Sep 13 00:51:18.174794 kubelet[1688]: E0913 00:51:18.174761 1688 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:18.176535 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:18.176704 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:27.318945 systemd[1]: Created slice system-sshd.slice. Sep 13 00:51:27.320663 systemd[1]: Started sshd@0-10.200.4.44:22-10.200.16.10:55880.service. Sep 13 00:51:28.117056 sshd[1694]: Accepted publickey for core from 10.200.16.10 port 55880 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:28.118414 sshd[1694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:28.122574 systemd-logind[1433]: New session 3 of user core. Sep 13 00:51:28.123146 systemd[1]: Started session-3.scope. Sep 13 00:51:28.291385 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 00:51:28.291596 systemd[1]: Stopped kubelet.service. Sep 13 00:51:28.293120 systemd[1]: Starting kubelet.service... Sep 13 00:51:28.382859 systemd[1]: Started kubelet.service. Sep 13 00:51:28.422448 kubelet[1701]: E0913 00:51:28.422414 1701 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:28.423945 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:28.424106 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:28.636849 systemd[1]: Started sshd@1-10.200.4.44:22-10.200.16.10:55890.service. Sep 13 00:51:29.222221 sshd[1708]: Accepted publickey for core from 10.200.16.10 port 55890 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:29.223535 sshd[1708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:29.228025 systemd[1]: Started session-4.scope. Sep 13 00:51:29.228432 systemd-logind[1433]: New session 4 of user core. Sep 13 00:51:29.639741 sshd[1708]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:29.642206 systemd[1]: sshd@1-10.200.4.44:22-10.200.16.10:55890.service: Deactivated successfully. Sep 13 00:51:29.642987 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:51:29.643531 systemd-logind[1433]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:51:29.644236 systemd-logind[1433]: Removed session 4. Sep 13 00:51:29.738253 systemd[1]: Started sshd@2-10.200.4.44:22-10.200.16.10:55906.service. Sep 13 00:51:30.327252 sshd[1714]: Accepted publickey for core from 10.200.16.10 port 55906 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:30.328557 sshd[1714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:30.332731 systemd-logind[1433]: New session 5 of user core. Sep 13 00:51:30.333038 systemd[1]: Started session-5.scope. Sep 13 00:51:30.744375 sshd[1714]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:30.747023 systemd[1]: sshd@2-10.200.4.44:22-10.200.16.10:55906.service: Deactivated successfully. Sep 13 00:51:30.747803 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:51:30.748365 systemd-logind[1433]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:51:30.749077 systemd-logind[1433]: Removed session 5. Sep 13 00:51:30.843250 systemd[1]: Started sshd@3-10.200.4.44:22-10.200.16.10:52176.service. Sep 13 00:51:31.433106 sshd[1720]: Accepted publickey for core from 10.200.16.10 port 52176 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:31.434432 sshd[1720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:31.439016 systemd[1]: Started session-6.scope. Sep 13 00:51:31.439592 systemd-logind[1433]: New session 6 of user core. Sep 13 00:51:31.862310 sshd[1720]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:31.864668 systemd[1]: sshd@3-10.200.4.44:22-10.200.16.10:52176.service: Deactivated successfully. Sep 13 00:51:31.865397 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:51:31.865940 systemd-logind[1433]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:51:31.866596 systemd-logind[1433]: Removed session 6. Sep 13 00:51:31.960727 systemd[1]: Started sshd@4-10.200.4.44:22-10.200.16.10:52178.service. Sep 13 00:51:32.549803 sshd[1726]: Accepted publickey for core from 10.200.16.10 port 52178 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:32.551033 sshd[1726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:32.555422 systemd[1]: Started session-7.scope. Sep 13 00:51:32.555860 systemd-logind[1433]: New session 7 of user core. Sep 13 00:51:32.673031 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 13 00:51:33.183766 sudo[1729]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:51:33.184065 sudo[1729]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:33.202839 dbus-daemon[1420]: \xd0͇a\x9fU: received setenforce notice (enforcing=973988176) Sep 13 00:51:33.204485 sudo[1729]: pam_unix(sudo:session): session closed for user root Sep 13 00:51:33.321986 sshd[1726]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:33.324814 systemd[1]: sshd@4-10.200.4.44:22-10.200.16.10:52178.service: Deactivated successfully. Sep 13 00:51:33.325641 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:51:33.326247 systemd-logind[1433]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:51:33.327024 systemd-logind[1433]: Removed session 7. Sep 13 00:51:33.419415 systemd[1]: Started sshd@5-10.200.4.44:22-10.200.16.10:52180.service. Sep 13 00:51:34.003195 sshd[1733]: Accepted publickey for core from 10.200.16.10 port 52180 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:34.004608 sshd[1733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:34.009194 systemd[1]: Started session-8.scope. Sep 13 00:51:34.009780 systemd-logind[1433]: New session 8 of user core. Sep 13 00:51:34.328962 sudo[1737]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:51:34.329246 sudo[1737]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:34.331988 sudo[1737]: pam_unix(sudo:session): session closed for user root Sep 13 00:51:34.336499 sudo[1736]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:51:34.336800 sudo[1736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:34.345343 systemd[1]: Stopping audit-rules.service... Sep 13 00:51:34.345000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:51:34.347935 auditctl[1740]: No rules Sep 13 00:51:34.350920 kernel: kauditd_printk_skb: 52 callbacks suppressed Sep 13 00:51:34.350994 kernel: audit: type=1305 audit(1757724694.345:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:51:34.351971 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:51:34.352163 systemd[1]: Stopped audit-rules.service. Sep 13 00:51:34.353966 systemd[1]: Starting audit-rules.service... Sep 13 00:51:34.377518 kernel: audit: type=1300 audit(1757724694.345:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2c67de80 a2=420 a3=0 items=0 ppid=1 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:34.345000 audit[1740]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2c67de80 a2=420 a3=0 items=0 ppid=1 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:34.345000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:51:34.382808 augenrules[1757]: No rules Sep 13 00:51:34.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.383759 systemd[1]: Finished audit-rules.service. Sep 13 00:51:34.386485 sudo[1736]: pam_unix(sudo:session): session closed for user root Sep 13 00:51:34.396346 kernel: audit: type=1327 audit(1757724694.345:213): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:51:34.396438 kernel: audit: type=1131 audit(1757724694.351:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.396476 kernel: audit: type=1130 audit(1757724694.383:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.422942 kernel: audit: type=1106 audit(1757724694.385:216): pid=1736 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.385000 audit[1736]: USER_END pid=1736 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.385000 audit[1736]: CRED_DISP pid=1736 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.423645 kernel: audit: type=1104 audit(1757724694.385:217): pid=1736 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.481663 sshd[1733]: pam_unix(sshd:session): session closed for user core Sep 13 00:51:34.482000 audit[1733]: USER_END pid=1733 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:34.484678 systemd[1]: sshd@5-10.200.4.44:22-10.200.16.10:52180.service: Deactivated successfully. Sep 13 00:51:34.485436 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:51:34.486760 systemd-logind[1433]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:51:34.487735 systemd-logind[1433]: Removed session 8. Sep 13 00:51:34.482000 audit[1733]: CRED_DISP pid=1733 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:34.513993 kernel: audit: type=1106 audit(1757724694.482:218): pid=1733 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:34.514111 kernel: audit: type=1104 audit(1757724694.482:219): pid=1733 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:34.514159 kernel: audit: type=1131 audit(1757724694.484:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.44:22-10.200.16.10:52180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.44:22-10.200.16.10:52180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:34.579230 systemd[1]: Started sshd@6-10.200.4.44:22-10.200.16.10:52192.service. Sep 13 00:51:34.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.44:22-10.200.16.10:52192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:35.168000 audit[1763]: USER_ACCT pid=1763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:35.169423 sshd[1763]: Accepted publickey for core from 10.200.16.10 port 52192 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:51:35.169000 audit[1763]: CRED_ACQ pid=1763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:35.169000 audit[1763]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ae2dd20 a2=3 a3=0 items=0 ppid=1 pid=1763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:51:35.170745 sshd[1763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:51:35.175153 systemd[1]: Started session-9.scope. Sep 13 00:51:35.175578 systemd-logind[1433]: New session 9 of user core. Sep 13 00:51:35.179000 audit[1763]: USER_START pid=1763 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:35.180000 audit[1765]: CRED_ACQ pid=1765 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:51:35.495000 audit[1766]: USER_ACCT pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:35.495000 audit[1766]: CRED_REFR pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:35.496038 sudo[1766]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:51:35.496328 sudo[1766]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:51:35.497000 audit[1766]: USER_START pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:51:35.529843 systemd[1]: Starting docker.service... Sep 13 00:51:35.580098 env[1777]: time="2025-09-13T00:51:35.580043259Z" level=info msg="Starting up" Sep 13 00:51:35.581365 env[1777]: time="2025-09-13T00:51:35.581329149Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:51:35.581365 env[1777]: time="2025-09-13T00:51:35.581351249Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:51:35.581495 env[1777]: time="2025-09-13T00:51:35.581374449Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:51:35.581495 env[1777]: time="2025-09-13T00:51:35.581387149Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:51:35.582999 env[1777]: time="2025-09-13T00:51:35.582968237Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:51:35.582999 env[1777]: time="2025-09-13T00:51:35.582987337Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:51:35.583127 env[1777]: time="2025-09-13T00:51:35.583003236Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:51:35.583127 env[1777]: time="2025-09-13T00:51:35.583015136Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:51:35.659069 env[1777]: time="2025-09-13T00:51:35.659031353Z" level=info msg="Loading containers: start." Sep 13 00:51:35.723000 audit[1804]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.723000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff2e453210 a2=0 a3=7fff2e4531fc items=0 ppid=1777 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.723000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 13 00:51:35.724000 audit[1806]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.724000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe213a3df0 a2=0 a3=7ffe213a3ddc items=0 ppid=1777 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 13 00:51:35.726000 audit[1808]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.726000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff78f4c140 a2=0 a3=7fff78f4c12c items=0 ppid=1777 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:51:35.728000 audit[1810]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.728000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe68ade5f0 a2=0 a3=7ffe68ade5dc items=0 ppid=1777 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:51:35.730000 audit[1812]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.730000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe38926fd0 a2=0 a3=7ffe38926fbc items=0 ppid=1777 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 13 00:51:35.732000 audit[1814]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.732000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8869c0b0 a2=0 a3=7ffc8869c09c items=0 ppid=1777 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 13 00:51:35.747000 audit[1816]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.747000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffb77a3f10 a2=0 a3=7fffb77a3efc items=0 ppid=1777 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 13 00:51:35.750000 audit[1818]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.750000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffddb7b2c00 a2=0 a3=7ffddb7b2bec items=0 ppid=1777 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 13 00:51:35.752000 audit[1820]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.752000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffecd263f0 a2=0 a3=7fffecd263dc items=0 ppid=1777 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:35.767000 audit[1824]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.767000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeed760ef0 a2=0 a3=7ffeed760edc items=0 ppid=1777 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:35.772000 audit[1825]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.772000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffd22460c0 a2=0 a3=7fffd22460ac items=0 ppid=1777 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:35.830821 kernel: Initializing XFRM netlink socket Sep 13 00:51:35.862980 env[1777]: time="2025-09-13T00:51:35.862936388Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 13 00:51:35.954000 audit[1833]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.954000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc59cc0730 a2=0 a3=7ffc59cc071c items=0 ppid=1777 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.954000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 13 00:51:35.986000 audit[1836]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.986000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffdf81ed10 a2=0 a3=7fffdf81ecfc items=0 ppid=1777 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 13 00:51:35.990000 audit[1839]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.990000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe86e60040 a2=0 a3=7ffe86e6002c items=0 ppid=1777 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 13 00:51:35.992000 audit[1841]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.992000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff5eeabf60 a2=0 a3=7fff5eeabf4c items=0 ppid=1777 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 13 00:51:35.994000 audit[1843]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.994000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffefa2d8310 a2=0 a3=7ffefa2d82fc items=0 ppid=1777 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 13 00:51:35.996000 audit[1845]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.996000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffefbed2810 a2=0 a3=7ffefbed27fc items=0 ppid=1777 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 13 00:51:35.998000 audit[1847]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:35.998000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc9c832df0 a2=0 a3=7ffc9c832ddc items=0 ppid=1777 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:35.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 13 00:51:36.000000 audit[1849]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:36.000000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffedc2d9370 a2=0 a3=7ffedc2d935c items=0 ppid=1777 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:36.000000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 13 00:51:36.003000 audit[1851]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:36.003000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffff1e76f20 a2=0 a3=7ffff1e76f0c items=0 ppid=1777 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:36.003000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:51:36.005000 audit[1853]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:36.005000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd599a8e10 a2=0 a3=7ffd599a8dfc items=0 ppid=1777 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:36.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:51:36.007000 audit[1855]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:36.007000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda4ada990 a2=0 a3=7ffda4ada97c items=0 ppid=1777 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:36.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 13 00:51:36.008176 systemd-networkd[1596]: docker0: Link UP Sep 13 00:51:36.024000 audit[1859]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:36.024000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc44ff9380 a2=0 a3=7ffc44ff936c items=0 ppid=1777 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:36.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:36.031000 audit[1860]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:51:36.031000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff5ce76a70 a2=0 a3=7fff5ce76a5c items=0 ppid=1777 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:51:36.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:51:36.032115 env[1777]: time="2025-09-13T00:51:36.032084405Z" level=info msg="Loading containers: done." Sep 13 00:51:36.084954 env[1777]: time="2025-09-13T00:51:36.084904925Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 13 00:51:36.085165 env[1777]: time="2025-09-13T00:51:36.085117023Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 13 00:51:36.085262 env[1777]: time="2025-09-13T00:51:36.085235823Z" level=info msg="Daemon has completed initialization" Sep 13 00:51:36.116069 systemd[1]: Started docker.service. Sep 13 00:51:36.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:36.124246 env[1777]: time="2025-09-13T00:51:36.124193942Z" level=info msg="API listen on /run/docker.sock" Sep 13 00:51:38.541427 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 00:51:38.541687 systemd[1]: Stopped kubelet.service. Sep 13 00:51:38.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:38.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:38.543179 systemd[1]: Starting kubelet.service... Sep 13 00:51:39.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:39.228005 systemd[1]: Started kubelet.service. Sep 13 00:51:39.276100 kubelet[1897]: E0913 00:51:39.276054 1897 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:39.277734 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:39.277895 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:39.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:40.363439 env[1460]: time="2025-09-13T00:51:40.363382317Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Sep 13 00:51:41.081191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1686752264.mount: Deactivated successfully. Sep 13 00:51:41.368885 update_engine[1434]: I0913 00:51:41.368681 1434 update_attempter.cc:509] Updating boot flags... Sep 13 00:51:42.913533 env[1460]: time="2025-09-13T00:51:42.913478904Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:42.918063 env[1460]: time="2025-09-13T00:51:42.918021782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:42.921984 env[1460]: time="2025-09-13T00:51:42.921952363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:42.925159 env[1460]: time="2025-09-13T00:51:42.925127447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:42.925769 env[1460]: time="2025-09-13T00:51:42.925738544Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62\"" Sep 13 00:51:42.926326 env[1460]: time="2025-09-13T00:51:42.926297941Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Sep 13 00:51:44.770015 env[1460]: time="2025-09-13T00:51:44.769965088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:44.775199 env[1460]: time="2025-09-13T00:51:44.775156565Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:44.781720 env[1460]: time="2025-09-13T00:51:44.781682037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:44.787197 env[1460]: time="2025-09-13T00:51:44.787145014Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:44.787902 env[1460]: time="2025-09-13T00:51:44.787861111Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668\"" Sep 13 00:51:44.788942 env[1460]: time="2025-09-13T00:51:44.788911006Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Sep 13 00:51:46.303918 env[1460]: time="2025-09-13T00:51:46.303867928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:46.308407 env[1460]: time="2025-09-13T00:51:46.308370211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:46.311523 env[1460]: time="2025-09-13T00:51:46.311491399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:46.314408 env[1460]: time="2025-09-13T00:51:46.314376388Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:46.315079 env[1460]: time="2025-09-13T00:51:46.315039186Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf\"" Sep 13 00:51:46.315568 env[1460]: time="2025-09-13T00:51:46.315545684Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Sep 13 00:51:47.704400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2821130546.mount: Deactivated successfully. Sep 13 00:51:48.436670 env[1460]: time="2025-09-13T00:51:48.436612715Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.441687 env[1460]: time="2025-09-13T00:51:48.441653799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.444505 env[1460]: time="2025-09-13T00:51:48.444473389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.447153 env[1460]: time="2025-09-13T00:51:48.447125880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:48.447470 env[1460]: time="2025-09-13T00:51:48.447436479Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Sep 13 00:51:48.448086 env[1460]: time="2025-09-13T00:51:48.448064177Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Sep 13 00:51:49.018815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3575610240.mount: Deactivated successfully. Sep 13 00:51:49.291520 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 13 00:51:49.291779 systemd[1]: Stopped kubelet.service. Sep 13 00:51:49.293098 systemd[1]: Starting kubelet.service... Sep 13 00:51:49.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:49.297099 kernel: kauditd_printk_skb: 88 callbacks suppressed Sep 13 00:51:49.297172 kernel: audit: type=1130 audit(1757724709.291:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:49.320962 kernel: audit: type=1131 audit(1757724709.291:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:49.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:49.455905 systemd[1]: Started kubelet.service. Sep 13 00:51:49.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:49.468647 kernel: audit: type=1130 audit(1757724709.455:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:49.499726 kubelet[1974]: E0913 00:51:49.499681 1974 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:51:49.501185 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:51:49.501340 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:51:49.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:49.517654 kernel: audit: type=1131 audit(1757724709.500:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:51.489853 env[1460]: time="2025-09-13T00:51:51.489809581Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:51.496829 env[1460]: time="2025-09-13T00:51:51.496782862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:51.501804 env[1460]: time="2025-09-13T00:51:51.501756548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:51.504937 env[1460]: time="2025-09-13T00:51:51.504898440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:51.506143 env[1460]: time="2025-09-13T00:51:51.506089537Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Sep 13 00:51:51.506834 env[1460]: time="2025-09-13T00:51:51.506811135Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 13 00:51:52.087478 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1050714635.mount: Deactivated successfully. Sep 13 00:51:52.102279 env[1460]: time="2025-09-13T00:51:52.102229323Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.106827 env[1460]: time="2025-09-13T00:51:52.106771212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.109948 env[1460]: time="2025-09-13T00:51:52.109907504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.112887 env[1460]: time="2025-09-13T00:51:52.112849196Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:52.113274 env[1460]: time="2025-09-13T00:51:52.113244495Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 13 00:51:52.113920 env[1460]: time="2025-09-13T00:51:52.113896393Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Sep 13 00:51:52.684570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1235929043.mount: Deactivated successfully. Sep 13 00:51:55.292942 env[1460]: time="2025-09-13T00:51:55.292893698Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:55.297935 env[1460]: time="2025-09-13T00:51:55.297898841Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:55.301436 env[1460]: time="2025-09-13T00:51:55.301404570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:55.304585 env[1460]: time="2025-09-13T00:51:55.304556497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:51:55.306440 env[1460]: time="2025-09-13T00:51:55.306402512Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Sep 13 00:51:58.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:58.718813 systemd[1]: Stopped kubelet.service. Sep 13 00:51:58.721471 systemd[1]: Starting kubelet.service... Sep 13 00:51:58.735672 kernel: audit: type=1130 audit(1757724718.718:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:58.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:58.754131 kernel: audit: type=1131 audit(1757724718.718:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:51:58.778814 systemd[1]: Reloading. Sep 13 00:51:58.867471 /usr/lib/systemd/system-generators/torcx-generator[2025]: time="2025-09-13T00:51:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:51:58.867930 /usr/lib/systemd/system-generators/torcx-generator[2025]: time="2025-09-13T00:51:58Z" level=info msg="torcx already run" Sep 13 00:51:58.949240 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:51:58.949261 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:51:58.964156 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047112 kernel: audit: type=1400 audit(1757724719.030:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.075987 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:51:59.076106 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:51:59.076130 kernel: audit: type=1400 audit(1757724719.030:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.076158 kernel: audit: backlog limit exceeded Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.085734 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:51:59.086289 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:51:59.106301 kernel: audit: type=1400 audit(1757724719.030:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.045000 audit: BPF prog-id=41 op=LOAD Sep 13 00:51:59.045000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit: BPF prog-id=42 op=LOAD Sep 13 00:51:59.047000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit: BPF prog-id=43 op=LOAD Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit: BPF prog-id=44 op=LOAD Sep 13 00:51:59.047000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:51:59.047000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit: BPF prog-id=45 op=LOAD Sep 13 00:51:59.048000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.080000 audit: BPF prog-id=46 op=LOAD Sep 13 00:51:59.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:51:59.110000 audit: BPF prog-id=55 op=LOAD Sep 13 00:51:59.110000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:51:59.379155 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Sep 13 00:51:59.379263 systemd[1]: kubelet.service: Failed with result 'signal'. Sep 13 00:51:59.379513 systemd[1]: Stopped kubelet.service. Sep 13 00:51:59.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:51:59.381732 systemd[1]: Starting kubelet.service... Sep 13 00:52:00.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:00.116981 systemd[1]: Started kubelet.service. Sep 13 00:52:00.845968 kubelet[2091]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:00.845968 kubelet[2091]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:52:00.845968 kubelet[2091]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:00.846451 kubelet[2091]: I0913 00:52:00.846075 2091 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:52:01.786599 kubelet[2091]: I0913 00:52:01.786556 2091 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 00:52:01.786599 kubelet[2091]: I0913 00:52:01.786583 2091 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:52:01.786887 kubelet[2091]: I0913 00:52:01.786869 2091 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 00:52:01.821589 kubelet[2091]: E0913 00:52:01.821548 2091 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.200.4.44:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Sep 13 00:52:01.822043 kubelet[2091]: I0913 00:52:01.822020 2091 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:52:01.829857 kubelet[2091]: E0913 00:52:01.829802 2091 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:52:01.829857 kubelet[2091]: I0913 00:52:01.829852 2091 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:52:01.833492 kubelet[2091]: I0913 00:52:01.833470 2091 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:52:01.833724 kubelet[2091]: I0913 00:52:01.833689 2091 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:52:01.833916 kubelet[2091]: I0913 00:52:01.833721 2091 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.8-n-99e6272c46","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:52:01.834054 kubelet[2091]: I0913 00:52:01.833920 2091 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:52:01.834054 kubelet[2091]: I0913 00:52:01.833933 2091 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 00:52:01.834130 kubelet[2091]: I0913 00:52:01.834070 2091 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:01.836130 kubelet[2091]: I0913 00:52:01.836101 2091 kubelet.go:480] "Attempting to sync node with API server" Sep 13 00:52:01.836130 kubelet[2091]: I0913 00:52:01.836132 2091 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:52:01.843549 kubelet[2091]: I0913 00:52:01.843523 2091 kubelet.go:386] "Adding apiserver pod source" Sep 13 00:52:01.843549 kubelet[2091]: I0913 00:52:01.843550 2091 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:52:01.871076 kubelet[2091]: E0913 00:52:01.870558 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.4.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-99e6272c46&limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 13 00:52:01.874601 kubelet[2091]: E0913 00:52:01.874566 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.4.44:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 13 00:52:01.874862 kubelet[2091]: I0913 00:52:01.874849 2091 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:52:01.875538 kubelet[2091]: I0913 00:52:01.875521 2091 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 00:52:01.876393 kubelet[2091]: W0913 00:52:01.876378 2091 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:52:01.879126 kubelet[2091]: I0913 00:52:01.879103 2091 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:52:01.879204 kubelet[2091]: I0913 00:52:01.879164 2091 server.go:1289] "Started kubelet" Sep 13 00:52:01.885840 kubelet[2091]: I0913 00:52:01.885789 2091 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:52:01.886962 kubelet[2091]: I0913 00:52:01.886907 2091 server.go:317] "Adding debug handlers to kubelet server" Sep 13 00:52:01.887120 kubelet[2091]: I0913 00:52:01.887074 2091 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:52:01.887496 kubelet[2091]: I0913 00:52:01.887480 2091 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:52:01.889090 kubelet[2091]: E0913 00:52:01.887740 2091 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.44:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.44:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.8-n-99e6272c46.1864b1525c870c6c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.8-n-99e6272c46,UID:ci-3510.3.8-n-99e6272c46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.8-n-99e6272c46,},FirstTimestamp:2025-09-13 00:52:01.8791251 +0000 UTC m=+1.757960338,LastTimestamp:2025-09-13 00:52:01.8791251 +0000 UTC m=+1.757960338,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.8-n-99e6272c46,}" Sep 13 00:52:01.890000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:01.890000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:01.890000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5bf50 a1=c000b6ab88 a2=c000b5bf20 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.891075 kubelet[2091]: I0913 00:52:01.891054 2091 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:52:01.891173 kubelet[2091]: I0913 00:52:01.891159 2091 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:52:01.891312 kubelet[2091]: I0913 00:52:01.891301 2091 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:52:01.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:01.890000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:01.890000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:01.890000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00087af80 a1=c000b6aba0 a2=c000b58000 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:01.893092 kubelet[2091]: I0913 00:52:01.893077 2091 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:52:01.896666 kubelet[2091]: E0913 00:52:01.896620 2091 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:52:01.897451 kubelet[2091]: E0913 00:52:01.897430 2091 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-99e6272c46\" not found" Sep 13 00:52:01.897570 kubelet[2091]: I0913 00:52:01.897561 2091 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:52:01.897000 audit[2106]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.897000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffefbd938f0 a2=0 a3=7ffefbd938dc items=0 ppid=2091 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:52:01.898115 kubelet[2091]: I0913 00:52:01.898103 2091 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:52:01.898223 kubelet[2091]: I0913 00:52:01.898214 2091 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:52:01.898000 audit[2107]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.898000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef7876ad0 a2=0 a3=7ffef7876abc items=0 ppid=2091 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:52:01.899234 kubelet[2091]: I0913 00:52:01.899221 2091 factory.go:223] Registration of the systemd container factory successfully Sep 13 00:52:01.899379 kubelet[2091]: I0913 00:52:01.899364 2091 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:52:01.899926 kubelet[2091]: E0913 00:52:01.899901 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.4.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 13 00:52:01.900840 kubelet[2091]: I0913 00:52:01.900826 2091 factory.go:223] Registration of the containerd container factory successfully Sep 13 00:52:01.901000 audit[2109]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.901000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd5e3ff160 a2=0 a3=7ffd5e3ff14c items=0 ppid=2091 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:01.904000 audit[2111]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.904000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6e3e3320 a2=0 a3=7fff6e3e330c items=0 ppid=2091 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:01.910333 kubelet[2091]: E0913 00:52:01.910293 2091 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-99e6272c46?timeout=10s\": dial tcp 10.200.4.44:6443: connect: connection refused" interval="200ms" Sep 13 00:52:01.946848 kubelet[2091]: I0913 00:52:01.946817 2091 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:52:01.946848 kubelet[2091]: I0913 00:52:01.946846 2091 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:52:01.947020 kubelet[2091]: I0913 00:52:01.946863 2091 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:01.946000 audit[2117]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.946000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff803dff50 a2=0 a3=7fff803dff3c items=0 ppid=2091 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:52:01.947550 kubelet[2091]: I0913 00:52:01.947514 2091 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 00:52:01.948000 audit[2120]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.948000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2425e820 a2=0 a3=7fff2425e80c items=0 ppid=2091 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:52:01.948000 audit[2119]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:01.948000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe8f96bc0 a2=0 a3=10e3 items=0 ppid=2091 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:52:01.950555 kubelet[2091]: I0913 00:52:01.949393 2091 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 00:52:01.950555 kubelet[2091]: I0913 00:52:01.949411 2091 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 00:52:01.950555 kubelet[2091]: I0913 00:52:01.949437 2091 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:52:01.950555 kubelet[2091]: I0913 00:52:01.949447 2091 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 00:52:01.950555 kubelet[2091]: E0913 00:52:01.949495 2091 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:52:01.950000 audit[2123]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.950000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9a46fda0 a2=0 a3=7ffe9a46fd8c items=0 ppid=2091 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:52:01.951233 kubelet[2091]: E0913 00:52:01.951206 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.4.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Sep 13 00:52:01.951453 kubelet[2091]: I0913 00:52:01.951441 2091 policy_none.go:49] "None policy: Start" Sep 13 00:52:01.951550 kubelet[2091]: I0913 00:52:01.951540 2091 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:52:01.951620 kubelet[2091]: I0913 00:52:01.951613 2091 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:52:01.951000 audit[2124]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:01.951000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc6e575e0 a2=0 a3=7ffdc6e575cc items=0 ppid=2091 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:52:01.952000 audit[2125]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:01.952000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7dddb670 a2=0 a3=7ffd7dddb65c items=0 ppid=2091 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:52:01.953000 audit[2126]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:01.953000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd4a184f30 a2=0 a3=7ffd4a184f1c items=0 ppid=2091 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:52:01.954000 audit[2127]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:01.954000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe62fb5880 a2=0 a3=7ffe62fb586c items=0 ppid=2091 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:52:01.958124 systemd[1]: Created slice kubepods.slice. Sep 13 00:52:01.962106 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:52:01.964684 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:52:01.970282 kubelet[2091]: E0913 00:52:01.970268 2091 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 00:52:01.969000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:01.969000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:01.969000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007109c0 a1=c000cb7170 a2=c000710990 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:01.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:01.970648 kubelet[2091]: E0913 00:52:01.970605 2091 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 00:52:01.970843 kubelet[2091]: I0913 00:52:01.970833 2091 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:52:01.970962 kubelet[2091]: I0913 00:52:01.970920 2091 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:52:01.972011 kubelet[2091]: I0913 00:52:01.971349 2091 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:52:01.972714 kubelet[2091]: E0913 00:52:01.972694 2091 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:52:01.972791 kubelet[2091]: E0913 00:52:01.972737 2091 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.8-n-99e6272c46\" not found" Sep 13 00:52:02.060385 systemd[1]: Created slice kubepods-burstable-pod446916d4c86b4c4bc0422e55bda63d1d.slice. Sep 13 00:52:02.069855 kubelet[2091]: E0913 00:52:02.069741 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.073592 kubelet[2091]: I0913 00:52:02.073134 2091 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.073425 systemd[1]: Created slice kubepods-burstable-podb212f37429b89fee374ffcd2804d6c08.slice. Sep 13 00:52:02.073789 kubelet[2091]: E0913 00:52:02.073616 2091 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.44:6443/api/v1/nodes\": dial tcp 10.200.4.44:6443: connect: connection refused" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.078856 kubelet[2091]: E0913 00:52:02.078550 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.080879 systemd[1]: Created slice kubepods-burstable-pod61f3777bdff82132ab0232ad51a1c1d0.slice. Sep 13 00:52:02.082730 kubelet[2091]: E0913 00:52:02.082710 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.111395 kubelet[2091]: E0913 00:52:02.111368 2091 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-99e6272c46?timeout=10s\": dial tcp 10.200.4.44:6443: connect: connection refused" interval="400ms" Sep 13 00:52:02.199818 kubelet[2091]: I0913 00:52:02.199766 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-ca-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.199818 kubelet[2091]: I0913 00:52:02.199812 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200032 kubelet[2091]: I0913 00:52:02.199837 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200032 kubelet[2091]: I0913 00:52:02.199859 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200032 kubelet[2091]: I0913 00:52:02.199884 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/446916d4c86b4c4bc0422e55bda63d1d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" (UID: \"446916d4c86b4c4bc0422e55bda63d1d\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200032 kubelet[2091]: I0913 00:52:02.199905 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200032 kubelet[2091]: I0913 00:52:02.199926 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61f3777bdff82132ab0232ad51a1c1d0-kubeconfig\") pod \"kube-scheduler-ci-3510.3.8-n-99e6272c46\" (UID: \"61f3777bdff82132ab0232ad51a1c1d0\") " pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200151 kubelet[2091]: I0913 00:52:02.199945 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/446916d4c86b4c4bc0422e55bda63d1d-ca-certs\") pod \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" (UID: \"446916d4c86b4c4bc0422e55bda63d1d\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.200151 kubelet[2091]: I0913 00:52:02.199967 2091 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/446916d4c86b4c4bc0422e55bda63d1d-k8s-certs\") pod \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" (UID: \"446916d4c86b4c4bc0422e55bda63d1d\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.275444 kubelet[2091]: I0913 00:52:02.275411 2091 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.275811 kubelet[2091]: E0913 00:52:02.275782 2091 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.44:6443/api/v1/nodes\": dial tcp 10.200.4.44:6443: connect: connection refused" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.371470 env[1460]: time="2025-09-13T00:52:02.371361146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.8-n-99e6272c46,Uid:446916d4c86b4c4bc0422e55bda63d1d,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:02.382667 env[1460]: time="2025-09-13T00:52:02.382167921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.8-n-99e6272c46,Uid:b212f37429b89fee374ffcd2804d6c08,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:02.384343 env[1460]: time="2025-09-13T00:52:02.384311136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.8-n-99e6272c46,Uid:61f3777bdff82132ab0232ad51a1c1d0,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:02.512723 kubelet[2091]: E0913 00:52:02.512684 2091 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-99e6272c46?timeout=10s\": dial tcp 10.200.4.44:6443: connect: connection refused" interval="800ms" Sep 13 00:52:02.677581 kubelet[2091]: I0913 00:52:02.677496 2091 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.678139 kubelet[2091]: E0913 00:52:02.678101 2091 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.44:6443/api/v1/nodes\": dial tcp 10.200.4.44:6443: connect: connection refused" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:02.821404 kubelet[2091]: E0913 00:52:02.821367 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.4.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Sep 13 00:52:02.877235 kubelet[2091]: E0913 00:52:02.877192 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.4.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.8-n-99e6272c46&limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 13 00:52:02.953194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount91598572.mount: Deactivated successfully. Sep 13 00:52:02.973919 env[1460]: time="2025-09-13T00:52:02.973862234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:02.975997 env[1460]: time="2025-09-13T00:52:02.975958449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:02.982606 env[1460]: time="2025-09-13T00:52:02.982578995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:02.985094 env[1460]: time="2025-09-13T00:52:02.985065512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:02.987074 env[1460]: time="2025-09-13T00:52:02.987044526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:02.988841 env[1460]: time="2025-09-13T00:52:02.988816038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:02.995459 env[1460]: time="2025-09-13T00:52:02.995427784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:03.000203 env[1460]: time="2025-09-13T00:52:03.000168417Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:03.002566 env[1460]: time="2025-09-13T00:52:03.002537233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:03.006859 env[1460]: time="2025-09-13T00:52:03.006831062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:03.009131 env[1460]: time="2025-09-13T00:52:03.009102278Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:03.015886 kubelet[2091]: E0913 00:52:03.015771 2091 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.44:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.44:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.8-n-99e6272c46.1864b1525c870c6c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.8-n-99e6272c46,UID:ci-3510.3.8-n-99e6272c46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.8-n-99e6272c46,},FirstTimestamp:2025-09-13 00:52:01.8791251 +0000 UTC m=+1.757960338,LastTimestamp:2025-09-13 00:52:01.8791251 +0000 UTC m=+1.757960338,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.8-n-99e6272c46,}" Sep 13 00:52:03.016514 env[1460]: time="2025-09-13T00:52:03.016475128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:03.052831 env[1460]: time="2025-09-13T00:52:03.052643372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:03.052831 env[1460]: time="2025-09-13T00:52:03.052689673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:03.052831 env[1460]: time="2025-09-13T00:52:03.052704273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:03.053050 env[1460]: time="2025-09-13T00:52:03.052916074Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2612960a6276004870a1d6529158d90c1a8f1f1f9100de15cc5703cc4f5c2238 pid=2135 runtime=io.containerd.runc.v2 Sep 13 00:52:03.061654 kubelet[2091]: E0913 00:52:03.060590 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.4.44:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 13 00:52:03.071597 systemd[1]: Started cri-containerd-2612960a6276004870a1d6529158d90c1a8f1f1f9100de15cc5703cc4f5c2238.scope. Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.083000 audit: BPF prog-id=56 op=LOAD Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313239363061363237363030343837306131643635323931353864 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313239363061363237363030343837306131643635323931353864 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.084000 audit: BPF prog-id=57 op=LOAD Sep 13 00:52:03.084000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d6490 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313239363061363237363030343837306131643635323931353864 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.086000 audit: BPF prog-id=58 op=LOAD Sep 13 00:52:03.086000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d64d8 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313239363061363237363030343837306131643635323931353864 Sep 13 00:52:03.087000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:52:03.087000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.087000 audit: BPF prog-id=59 op=LOAD Sep 13 00:52:03.087000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d68e8 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313239363061363237363030343837306131643635323931353864 Sep 13 00:52:03.096642 env[1460]: time="2025-09-13T00:52:03.092531742Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:03.096642 env[1460]: time="2025-09-13T00:52:03.092612043Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:03.096642 env[1460]: time="2025-09-13T00:52:03.092679043Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:03.096642 env[1460]: time="2025-09-13T00:52:03.092850944Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf19c6cf2c2b9fe12d6008f34d08044c5926ce960449aef358dc5b8f849de723 pid=2169 runtime=io.containerd.runc.v2 Sep 13 00:52:03.107474 env[1460]: time="2025-09-13T00:52:03.106561737Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:03.107474 env[1460]: time="2025-09-13T00:52:03.106608137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:03.107474 env[1460]: time="2025-09-13T00:52:03.106621137Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:03.107474 env[1460]: time="2025-09-13T00:52:03.106791239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bb7e2273aa7e8e17355c96bdd3b9a5d55e53949635098bd5d7e753760aad907 pid=2187 runtime=io.containerd.runc.v2 Sep 13 00:52:03.118019 systemd[1]: Started cri-containerd-bf19c6cf2c2b9fe12d6008f34d08044c5926ce960449aef358dc5b8f849de723.scope. Sep 13 00:52:03.126560 systemd[1]: Started cri-containerd-0bb7e2273aa7e8e17355c96bdd3b9a5d55e53949635098bd5d7e753760aad907.scope. Sep 13 00:52:03.150175 kubelet[2091]: E0913 00:52:03.150137 2091 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.4.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.44:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.151000 audit: BPF prog-id=60 op=LOAD Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2187 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062623765323237336161376538653137333535633936626464336239 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2187 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062623765323237336161376538653137333535633936626464336239 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit: BPF prog-id=61 op=LOAD Sep 13 00:52:03.152000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000219aa0 items=0 ppid=2187 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062623765323237336161376538653137333535633936626464336239 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit: BPF prog-id=62 op=LOAD Sep 13 00:52:03.152000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000219ae8 items=0 ppid=2187 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062623765323237336161376538653137333535633936626464336239 Sep 13 00:52:03.152000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:52:03.152000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.152000 audit: BPF prog-id=63 op=LOAD Sep 13 00:52:03.152000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000219ef8 items=0 ppid=2187 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062623765323237336161376538653137333535633936626464336239 Sep 13 00:52:03.163472 env[1460]: time="2025-09-13T00:52:03.163431722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.8-n-99e6272c46,Uid:b212f37429b89fee374ffcd2804d6c08,Namespace:kube-system,Attempt:0,} returns sandbox id \"2612960a6276004870a1d6529158d90c1a8f1f1f9100de15cc5703cc4f5c2238\"" Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.164000 audit: BPF prog-id=64 op=LOAD Sep 13 00:52:03.165000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.165000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2169 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313963366366326332623966653132643630303866333464303830 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2169 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313963366366326332623966653132643630303866333464303830 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit: BPF prog-id=65 op=LOAD Sep 13 00:52:03.166000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025340 items=0 ppid=2169 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313963366366326332623966653132643630303866333464303830 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.166000 audit: BPF prog-id=66 op=LOAD Sep 13 00:52:03.166000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025388 items=0 ppid=2169 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313963366366326332623966653132643630303866333464303830 Sep 13 00:52:03.167000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:52:03.167000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.167000 audit: BPF prog-id=67 op=LOAD Sep 13 00:52:03.167000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025798 items=0 ppid=2169 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313963366366326332623966653132643630303866333464303830 Sep 13 00:52:03.174850 env[1460]: time="2025-09-13T00:52:03.174779799Z" level=info msg="CreateContainer within sandbox \"2612960a6276004870a1d6529158d90c1a8f1f1f9100de15cc5703cc4f5c2238\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 13 00:52:03.210072 env[1460]: time="2025-09-13T00:52:03.205676008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.8-n-99e6272c46,Uid:446916d4c86b4c4bc0422e55bda63d1d,Namespace:kube-system,Attempt:0,} returns sandbox id \"bf19c6cf2c2b9fe12d6008f34d08044c5926ce960449aef358dc5b8f849de723\"" Sep 13 00:52:03.213087 env[1460]: time="2025-09-13T00:52:03.213052758Z" level=info msg="CreateContainer within sandbox \"bf19c6cf2c2b9fe12d6008f34d08044c5926ce960449aef358dc5b8f849de723\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 13 00:52:03.215678 env[1460]: time="2025-09-13T00:52:03.215650175Z" level=info msg="CreateContainer within sandbox \"2612960a6276004870a1d6529158d90c1a8f1f1f9100de15cc5703cc4f5c2238\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b29fa43cbc41d4a46962cd33ba229a2cd35ffb7e4b85611c23d51a932cccee2d\"" Sep 13 00:52:03.218920 env[1460]: time="2025-09-13T00:52:03.218898497Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.8-n-99e6272c46,Uid:61f3777bdff82132ab0232ad51a1c1d0,Namespace:kube-system,Attempt:0,} returns sandbox id \"0bb7e2273aa7e8e17355c96bdd3b9a5d55e53949635098bd5d7e753760aad907\"" Sep 13 00:52:03.219701 env[1460]: time="2025-09-13T00:52:03.219368900Z" level=info msg="StartContainer for \"b29fa43cbc41d4a46962cd33ba229a2cd35ffb7e4b85611c23d51a932cccee2d\"" Sep 13 00:52:03.226019 env[1460]: time="2025-09-13T00:52:03.225974245Z" level=info msg="CreateContainer within sandbox \"0bb7e2273aa7e8e17355c96bdd3b9a5d55e53949635098bd5d7e753760aad907\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 13 00:52:03.236983 systemd[1]: Started cri-containerd-b29fa43cbc41d4a46962cd33ba229a2cd35ffb7e4b85611c23d51a932cccee2d.scope. Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.252000 audit: BPF prog-id=68 op=LOAD Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2135 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232396661343363626334316434613436393632636433336261323239 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2135 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232396661343363626334316434613436393632636433336261323239 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit: BPF prog-id=69 op=LOAD Sep 13 00:52:03.253000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000294370 items=0 ppid=2135 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232396661343363626334316434613436393632636433336261323239 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit: BPF prog-id=70 op=LOAD Sep 13 00:52:03.253000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002943b8 items=0 ppid=2135 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232396661343363626334316434613436393632636433336261323239 Sep 13 00:52:03.253000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:52:03.253000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.253000 audit: BPF prog-id=71 op=LOAD Sep 13 00:52:03.253000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002947c8 items=0 ppid=2135 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232396661343363626334316434613436393632636433336261323239 Sep 13 00:52:03.259028 env[1460]: time="2025-09-13T00:52:03.258984068Z" level=info msg="CreateContainer within sandbox \"bf19c6cf2c2b9fe12d6008f34d08044c5926ce960449aef358dc5b8f849de723\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"21e29adb51cb6da313f7377f9f2c365793cd7163ddafd9e8c7aa30bc3a87e077\"" Sep 13 00:52:03.259556 env[1460]: time="2025-09-13T00:52:03.259525172Z" level=info msg="StartContainer for \"21e29adb51cb6da313f7377f9f2c365793cd7163ddafd9e8c7aa30bc3a87e077\"" Sep 13 00:52:03.276236 env[1460]: time="2025-09-13T00:52:03.276189585Z" level=info msg="CreateContainer within sandbox \"0bb7e2273aa7e8e17355c96bdd3b9a5d55e53949635098bd5d7e753760aad907\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8d497cffea31e15a5a5b7c1f20caf8cf319ccca52178da3f32448f48da5a4edd\"" Sep 13 00:52:03.276753 env[1460]: time="2025-09-13T00:52:03.276720688Z" level=info msg="StartContainer for \"8d497cffea31e15a5a5b7c1f20caf8cf319ccca52178da3f32448f48da5a4edd\"" Sep 13 00:52:03.291976 systemd[1]: Started cri-containerd-21e29adb51cb6da313f7377f9f2c365793cd7163ddafd9e8c7aa30bc3a87e077.scope. Sep 13 00:52:03.313861 kubelet[2091]: E0913 00:52:03.313818 2091 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.8-n-99e6272c46?timeout=10s\": dial tcp 10.200.4.44:6443: connect: connection refused" interval="1.6s" Sep 13 00:52:03.315334 systemd[1]: Started cri-containerd-8d497cffea31e15a5a5b7c1f20caf8cf319ccca52178da3f32448f48da5a4edd.scope. Sep 13 00:52:03.318933 env[1460]: time="2025-09-13T00:52:03.318844573Z" level=info msg="StartContainer for \"b29fa43cbc41d4a46962cd33ba229a2cd35ffb7e4b85611c23d51a932cccee2d\" returns successfully" Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.322000 audit: BPF prog-id=72 op=LOAD Sep 13 00:52:03.323000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.323000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2169 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653239616462353163623664613331336637333737663966326333 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2169 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653239616462353163623664613331336637333737663966326333 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.324000 audit: BPF prog-id=73 op=LOAD Sep 13 00:52:03.324000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c4880 items=0 ppid=2169 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653239616462353163623664613331336637333737663966326333 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.325000 audit: BPF prog-id=74 op=LOAD Sep 13 00:52:03.325000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c48c8 items=0 ppid=2169 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653239616462353163623664613331336637333737663966326333 Sep 13 00:52:03.325000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:52:03.325000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.326000 audit: BPF prog-id=75 op=LOAD Sep 13 00:52:03.326000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4cd8 items=0 ppid=2169 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653239616462353163623664613331336637333737663966326333 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.344000 audit: BPF prog-id=76 op=LOAD Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2187 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864343937636666656133316531356135613562376331663230636166 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2187 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864343937636666656133316531356135613562376331663230636166 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.345000 audit: BPF prog-id=77 op=LOAD Sep 13 00:52:03.345000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000349cf0 items=0 ppid=2187 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864343937636666656133316531356135613562376331663230636166 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit: BPF prog-id=78 op=LOAD Sep 13 00:52:03.346000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000349d38 items=0 ppid=2187 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864343937636666656133316531356135613562376331663230636166 Sep 13 00:52:03.346000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:52:03.346000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:03.346000 audit: BPF prog-id=79 op=LOAD Sep 13 00:52:03.346000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003dc148 items=0 ppid=2187 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:03.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864343937636666656133316531356135613562376331663230636166 Sep 13 00:52:03.390412 env[1460]: time="2025-09-13T00:52:03.390369157Z" level=info msg="StartContainer for \"8d497cffea31e15a5a5b7c1f20caf8cf319ccca52178da3f32448f48da5a4edd\" returns successfully" Sep 13 00:52:03.414459 env[1460]: time="2025-09-13T00:52:03.414401520Z" level=info msg="StartContainer for \"21e29adb51cb6da313f7377f9f2c365793cd7163ddafd9e8c7aa30bc3a87e077\" returns successfully" Sep 13 00:52:03.480778 kubelet[2091]: I0913 00:52:03.480680 2091 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:03.481028 kubelet[2091]: E0913 00:52:03.481004 2091 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.44:6443/api/v1/nodes\": dial tcp 10.200.4.44:6443: connect: connection refused" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:03.961597 kubelet[2091]: E0913 00:52:03.961564 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:03.974032 kubelet[2091]: E0913 00:52:03.974004 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:03.976420 kubelet[2091]: E0913 00:52:03.976393 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:04.978769 kubelet[2091]: E0913 00:52:04.978740 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:04.979164 kubelet[2091]: E0913 00:52:04.979154 2091 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:05.083176 kubelet[2091]: I0913 00:52:05.083152 2091 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:05.811316 kernel: kauditd_printk_skb: 738 callbacks suppressed Sep 13 00:52:05.811461 kernel: audit: type=1400 audit(1757724725.785:471): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.785000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.785000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00396b9b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.843817 kernel: audit: type=1300 audit(1757724725.785:471): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00396b9b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.785000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.888656 kernel: audit: type=1327 audit(1757724725.785:471): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.888783 kernel: audit: type=1400 audit(1757724725.785:472): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.785000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.913145 kernel: audit: type=1300 audit(1757724725.785:472): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00797cde0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.785000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00797cde0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.785000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.958572 kernel: audit: type=1327 audit(1757724725.785:472): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.958767 kernel: audit: type=1400 audit(1757724725.785:473): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.785000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.785000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00396bb00 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.785000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:06.008177 kernel: audit: type=1300 audit(1757724725.785:473): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00396bb00 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:06.008321 kernel: audit: type=1327 audit(1757724725.785:473): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.838000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.838000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006849ac0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:06.030714 kernel: audit: type=1400 audit(1757724725.838:474): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.838000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.838000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0078b17a0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:05.843000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:05.843000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0078b1aa0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:52:05.843000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:52:06.088578 kubelet[2091]: E0913 00:52:06.088464 2091 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.8-n-99e6272c46\" not found" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.158346 kubelet[2091]: I0913 00:52:06.158313 2091 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.201488 kubelet[2091]: I0913 00:52:06.201467 2091 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.302534 kubelet[2091]: E0913 00:52:06.302506 2091 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.302718 kubelet[2091]: I0913 00:52:06.302707 2091 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.306396 kubelet[2091]: E0913 00:52:06.306366 2091 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.8-n-99e6272c46\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.306570 kubelet[2091]: I0913 00:52:06.306558 2091 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.309022 kubelet[2091]: E0913 00:52:06.308987 2091 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:06.420000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:06.420000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00051c000 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:06.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:06.420000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:06.420000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0002e40e0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:06.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:06.873964 kubelet[2091]: I0913 00:52:06.873924 2091 apiserver.go:52] "Watching apiserver" Sep 13 00:52:06.899166 kubelet[2091]: I0913 00:52:06.899138 2091 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:52:08.304598 systemd[1]: Reloading. Sep 13 00:52:08.392075 /usr/lib/systemd/system-generators/torcx-generator[2395]: time="2025-09-13T00:52:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:52:08.392114 /usr/lib/systemd/system-generators/torcx-generator[2395]: time="2025-09-13T00:52:08Z" level=info msg="torcx already run" Sep 13 00:52:08.475599 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:52:08.475619 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:52:08.490510 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.563000 audit: BPF prog-id=80 op=LOAD Sep 13 00:52:08.563000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit: BPF prog-id=81 op=LOAD Sep 13 00:52:08.564000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit: BPF prog-id=82 op=LOAD Sep 13 00:52:08.565000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit: BPF prog-id=83 op=LOAD Sep 13 00:52:08.565000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit: BPF prog-id=84 op=LOAD Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.565000 audit: BPF prog-id=85 op=LOAD Sep 13 00:52:08.566000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:52:08.566000 audit: BPF prog-id=44 op=UNLOAD Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit: BPF prog-id=86 op=LOAD Sep 13 00:52:08.567000 audit: BPF prog-id=45 op=UNLOAD Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit: BPF prog-id=87 op=LOAD Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.567000 audit: BPF prog-id=88 op=LOAD Sep 13 00:52:08.567000 audit: BPF prog-id=46 op=UNLOAD Sep 13 00:52:08.567000 audit: BPF prog-id=47 op=UNLOAD Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit: BPF prog-id=89 op=LOAD Sep 13 00:52:08.569000 audit: BPF prog-id=48 op=UNLOAD Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit: BPF prog-id=90 op=LOAD Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.569000 audit: BPF prog-id=91 op=LOAD Sep 13 00:52:08.569000 audit: BPF prog-id=49 op=UNLOAD Sep 13 00:52:08.569000 audit: BPF prog-id=50 op=UNLOAD Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit: BPF prog-id=92 op=LOAD Sep 13 00:52:08.570000 audit: BPF prog-id=51 op=UNLOAD Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit: BPF prog-id=93 op=LOAD Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.570000 audit: BPF prog-id=94 op=LOAD Sep 13 00:52:08.570000 audit: BPF prog-id=52 op=UNLOAD Sep 13 00:52:08.570000 audit: BPF prog-id=53 op=UNLOAD Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.571000 audit: BPF prog-id=95 op=LOAD Sep 13 00:52:08.571000 audit: BPF prog-id=54 op=UNLOAD Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit: BPF prog-id=96 op=LOAD Sep 13 00:52:08.572000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit: BPF prog-id=97 op=LOAD Sep 13 00:52:08.573000 audit: BPF prog-id=55 op=UNLOAD Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.573000 audit: BPF prog-id=98 op=LOAD Sep 13 00:52:08.573000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit: BPF prog-id=99 op=LOAD Sep 13 00:52:08.576000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.576000 audit: BPF prog-id=100 op=LOAD Sep 13 00:52:08.576000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:52:08.594549 systemd[1]: Stopping kubelet.service... Sep 13 00:52:08.621946 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:52:08.622157 systemd[1]: Stopped kubelet.service. Sep 13 00:52:08.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:08.622228 systemd[1]: kubelet.service: Consumed 1.402s CPU time. Sep 13 00:52:08.624076 systemd[1]: Starting kubelet.service... Sep 13 00:52:08.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:08.825968 systemd[1]: Started kubelet.service. Sep 13 00:52:08.871580 kubelet[2459]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:08.871936 kubelet[2459]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:52:08.871974 kubelet[2459]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:08.872085 kubelet[2459]: I0913 00:52:08.872055 2459 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:52:08.877178 kubelet[2459]: I0913 00:52:08.877158 2459 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 00:52:08.877298 kubelet[2459]: I0913 00:52:08.877290 2459 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:52:08.877556 kubelet[2459]: I0913 00:52:08.877546 2459 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 00:52:08.878793 kubelet[2459]: I0913 00:52:08.878779 2459 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Sep 13 00:52:08.880525 kubelet[2459]: I0913 00:52:08.880507 2459 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:52:08.889973 kubelet[2459]: E0913 00:52:08.889954 2459 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:52:08.890075 kubelet[2459]: I0913 00:52:08.890064 2459 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:52:08.893132 kubelet[2459]: I0913 00:52:08.893119 2459 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:52:08.893412 kubelet[2459]: I0913 00:52:08.893396 2459 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:52:08.893579 kubelet[2459]: I0913 00:52:08.893461 2459 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.8-n-99e6272c46","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:52:08.893699 kubelet[2459]: I0913 00:52:08.893667 2459 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:52:08.893699 kubelet[2459]: I0913 00:52:08.893684 2459 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 00:52:08.893769 kubelet[2459]: I0913 00:52:08.893737 2459 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:08.893899 kubelet[2459]: I0913 00:52:08.893882 2459 kubelet.go:480] "Attempting to sync node with API server" Sep 13 00:52:08.893942 kubelet[2459]: I0913 00:52:08.893900 2459 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:52:08.893942 kubelet[2459]: I0913 00:52:08.893923 2459 kubelet.go:386] "Adding apiserver pod source" Sep 13 00:52:08.893942 kubelet[2459]: I0913 00:52:08.893938 2459 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:52:08.895235 kubelet[2459]: I0913 00:52:08.895221 2459 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:52:08.895987 kubelet[2459]: I0913 00:52:08.895972 2459 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 00:52:08.898525 kubelet[2459]: I0913 00:52:08.898512 2459 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:52:08.898657 kubelet[2459]: I0913 00:52:08.898647 2459 server.go:1289] "Started kubelet" Sep 13 00:52:08.900000 audit[2459]: AVC avc: denied { mac_admin } for pid=2459 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.900000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:08.900000 audit[2459]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000927f50 a1=c00098b9e0 a2=c000927f20 a3=25 items=0 ppid=1 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:08.900000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:08.901278 kubelet[2459]: I0913 00:52:08.901248 2459 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:52:08.900000 audit[2459]: AVC avc: denied { mac_admin } for pid=2459 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.900000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:08.900000 audit[2459]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000981b20 a1=c00098b9f8 a2=c000b58000 a3=25 items=0 ppid=1 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:08.900000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:08.901604 kubelet[2459]: I0913 00:52:08.901587 2459 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:52:08.901727 kubelet[2459]: I0913 00:52:08.901718 2459 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:52:08.909991 kubelet[2459]: I0913 00:52:08.909966 2459 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:52:08.911079 kubelet[2459]: I0913 00:52:08.911064 2459 server.go:317] "Adding debug handlers to kubelet server" Sep 13 00:52:08.914953 kubelet[2459]: I0913 00:52:08.914904 2459 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:52:08.915211 kubelet[2459]: I0913 00:52:08.915200 2459 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:52:08.915719 kubelet[2459]: I0913 00:52:08.915623 2459 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:52:08.918399 kubelet[2459]: I0913 00:52:08.918386 2459 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:52:08.918739 kubelet[2459]: E0913 00:52:08.918724 2459 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.8-n-99e6272c46\" not found" Sep 13 00:52:08.926575 kubelet[2459]: I0913 00:52:08.922382 2459 factory.go:223] Registration of the systemd container factory successfully Sep 13 00:52:08.926575 kubelet[2459]: I0913 00:52:08.922498 2459 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:52:08.927295 kubelet[2459]: I0913 00:52:08.927273 2459 factory.go:223] Registration of the containerd container factory successfully Sep 13 00:52:08.927560 kubelet[2459]: I0913 00:52:08.927547 2459 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:52:08.927777 kubelet[2459]: I0913 00:52:08.927764 2459 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:52:08.942024 kubelet[2459]: I0913 00:52:08.941992 2459 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 00:52:08.943345 kubelet[2459]: I0913 00:52:08.943328 2459 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 00:52:08.943435 kubelet[2459]: I0913 00:52:08.943429 2459 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 00:52:08.943500 kubelet[2459]: I0913 00:52:08.943494 2459 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:52:08.943534 kubelet[2459]: I0913 00:52:08.943530 2459 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 00:52:08.943598 kubelet[2459]: E0913 00:52:08.943587 2459 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:52:08.953378 kubelet[2459]: E0913 00:52:08.953348 2459 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:52:08.980710 kubelet[2459]: I0913 00:52:08.980616 2459 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:52:08.980842 kubelet[2459]: I0913 00:52:08.980831 2459 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:52:08.980885 kubelet[2459]: I0913 00:52:08.980880 2459 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:08.981059 kubelet[2459]: I0913 00:52:08.981051 2459 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 13 00:52:08.981120 kubelet[2459]: I0913 00:52:08.981106 2459 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 13 00:52:08.981154 kubelet[2459]: I0913 00:52:08.981150 2459 policy_none.go:49] "None policy: Start" Sep 13 00:52:08.981196 kubelet[2459]: I0913 00:52:08.981192 2459 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:52:08.981230 kubelet[2459]: I0913 00:52:08.981226 2459 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:52:08.981350 kubelet[2459]: I0913 00:52:08.981344 2459 state_mem.go:75] "Updated machine memory state" Sep 13 00:52:08.984641 kubelet[2459]: E0913 00:52:08.984612 2459 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 00:52:08.985000 audit[2459]: AVC avc: denied { mac_admin } for pid=2459 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:08.985000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:08.985000 audit[2459]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ef0960 a1=c000f04858 a2=c000ef0930 a3=25 items=0 ppid=1 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:08.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:08.986029 kubelet[2459]: E0913 00:52:08.985760 2459 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 00:52:08.986029 kubelet[2459]: I0913 00:52:08.985897 2459 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:52:08.986029 kubelet[2459]: I0913 00:52:08.985909 2459 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:52:08.987164 kubelet[2459]: I0913 00:52:08.986301 2459 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:52:08.987399 kubelet[2459]: E0913 00:52:08.987275 2459 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:52:09.044514 kubelet[2459]: I0913 00:52:09.044464 2459 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.044786 kubelet[2459]: I0913 00:52:09.044465 2459 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.044950 kubelet[2459]: I0913 00:52:09.044565 2459 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.051943 kubelet[2459]: I0913 00:52:09.051915 2459 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 13 00:52:09.056145 kubelet[2459]: I0913 00:52:09.056117 2459 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 13 00:52:09.056357 kubelet[2459]: I0913 00:52:09.056344 2459 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 13 00:52:09.089876 kubelet[2459]: I0913 00:52:09.087795 2459 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.101444 kubelet[2459]: I0913 00:52:09.101405 2459 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.101596 kubelet[2459]: I0913 00:52:09.101501 2459 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.128950 kubelet[2459]: I0913 00:52:09.128913 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/446916d4c86b4c4bc0422e55bda63d1d-k8s-certs\") pod \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" (UID: \"446916d4c86b4c4bc0422e55bda63d1d\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.128950 kubelet[2459]: I0913 00:52:09.128953 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/446916d4c86b4c4bc0422e55bda63d1d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" (UID: \"446916d4c86b4c4bc0422e55bda63d1d\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129164 kubelet[2459]: I0913 00:52:09.128979 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-ca-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129164 kubelet[2459]: I0913 00:52:09.129002 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129164 kubelet[2459]: I0913 00:52:09.129022 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61f3777bdff82132ab0232ad51a1c1d0-kubeconfig\") pod \"kube-scheduler-ci-3510.3.8-n-99e6272c46\" (UID: \"61f3777bdff82132ab0232ad51a1c1d0\") " pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129164 kubelet[2459]: I0913 00:52:09.129045 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/446916d4c86b4c4bc0422e55bda63d1d-ca-certs\") pod \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" (UID: \"446916d4c86b4c4bc0422e55bda63d1d\") " pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129164 kubelet[2459]: I0913 00:52:09.129066 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129311 kubelet[2459]: I0913 00:52:09.129087 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.129311 kubelet[2459]: I0913 00:52:09.129110 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b212f37429b89fee374ffcd2804d6c08-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.8-n-99e6272c46\" (UID: \"b212f37429b89fee374ffcd2804d6c08\") " pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.901727 kubelet[2459]: I0913 00:52:09.901691 2459 apiserver.go:52] "Watching apiserver" Sep 13 00:52:09.928186 kubelet[2459]: I0913 00:52:09.928155 2459 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:52:09.971817 kubelet[2459]: I0913 00:52:09.970798 2459 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.971817 kubelet[2459]: I0913 00:52:09.971125 2459 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.980684 kubelet[2459]: I0913 00:52:09.980656 2459 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 13 00:52:09.980829 kubelet[2459]: E0913 00:52:09.980718 2459 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.8-n-99e6272c46\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:09.981616 kubelet[2459]: I0913 00:52:09.981596 2459 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 13 00:52:09.981728 kubelet[2459]: E0913 00:52:09.981655 2459 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.8-n-99e6272c46\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" Sep 13 00:52:10.000759 kubelet[2459]: I0913 00:52:10.000697 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.8-n-99e6272c46" podStartSLOduration=1.000681465 podStartE2EDuration="1.000681465s" podCreationTimestamp="2025-09-13 00:52:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:09.9894968 +0000 UTC m=+1.157513693" watchObservedRunningTime="2025-09-13 00:52:10.000681465 +0000 UTC m=+1.168698258" Sep 13 00:52:10.014891 kubelet[2459]: I0913 00:52:10.014828 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.8-n-99e6272c46" podStartSLOduration=1.014815344 podStartE2EDuration="1.014815344s" podCreationTimestamp="2025-09-13 00:52:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:10.000898566 +0000 UTC m=+1.168915459" watchObservedRunningTime="2025-09-13 00:52:10.014815344 +0000 UTC m=+1.182832237" Sep 13 00:52:10.015060 kubelet[2459]: I0913 00:52:10.014932 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.8-n-99e6272c46" podStartSLOduration=1.014926945 podStartE2EDuration="1.014926945s" podCreationTimestamp="2025-09-13 00:52:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:10.014330141 +0000 UTC m=+1.182347034" watchObservedRunningTime="2025-09-13 00:52:10.014926945 +0000 UTC m=+1.182943838" Sep 13 00:52:10.462000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:10.462000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097fa00 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:10.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:10.463000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:10.463000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097fbc0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:10.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:10.464000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:10.464000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:52:10.464000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bce1c0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:10.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:10.464000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097fd80 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:10.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:10.862000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:52:10.867929 kernel: kauditd_printk_skb: 284 callbacks suppressed Sep 13 00:52:10.868008 kernel: audit: type=1400 audit(1757724730.862:732): avc: denied { watch } for pid=2278 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:52:10.862000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e00640 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:10.911294 kernel: audit: type=1300 audit(1757724730.862:732): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e00640 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:52:10.911383 kernel: audit: type=1327 audit(1757724730.862:732): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:10.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:52:14.130455 kubelet[2459]: I0913 00:52:14.130358 2459 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 13 00:52:14.130984 env[1460]: time="2025-09-13T00:52:14.130784407Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:52:14.131302 kubelet[2459]: I0913 00:52:14.131026 2459 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 13 00:52:15.247759 systemd[1]: Created slice kubepods-besteffort-poddf6cb482_9c92_4100_9ac7_530ff5816750.slice. Sep 13 00:52:15.257676 kubelet[2459]: I0913 00:52:15.257650 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/df6cb482-9c92-4100-9ac7-530ff5816750-kube-proxy\") pod \"kube-proxy-r4mrs\" (UID: \"df6cb482-9c92-4100-9ac7-530ff5816750\") " pod="kube-system/kube-proxy-r4mrs" Sep 13 00:52:15.258100 kubelet[2459]: I0913 00:52:15.258076 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/df6cb482-9c92-4100-9ac7-530ff5816750-lib-modules\") pod \"kube-proxy-r4mrs\" (UID: \"df6cb482-9c92-4100-9ac7-530ff5816750\") " pod="kube-system/kube-proxy-r4mrs" Sep 13 00:52:15.258182 kubelet[2459]: I0913 00:52:15.258113 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/df6cb482-9c92-4100-9ac7-530ff5816750-xtables-lock\") pod \"kube-proxy-r4mrs\" (UID: \"df6cb482-9c92-4100-9ac7-530ff5816750\") " pod="kube-system/kube-proxy-r4mrs" Sep 13 00:52:15.258182 kubelet[2459]: I0913 00:52:15.258136 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9lm9\" (UniqueName: \"kubernetes.io/projected/df6cb482-9c92-4100-9ac7-530ff5816750-kube-api-access-h9lm9\") pod \"kube-proxy-r4mrs\" (UID: \"df6cb482-9c92-4100-9ac7-530ff5816750\") " pod="kube-system/kube-proxy-r4mrs" Sep 13 00:52:15.321040 systemd[1]: Created slice kubepods-besteffort-pod97c98a1d_9464_4d5d_8f78_2ff9d30714bf.slice. Sep 13 00:52:15.358697 kubelet[2459]: I0913 00:52:15.358658 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5plgj\" (UniqueName: \"kubernetes.io/projected/97c98a1d-9464-4d5d-8f78-2ff9d30714bf-kube-api-access-5plgj\") pod \"tigera-operator-755d956888-mnwbb\" (UID: \"97c98a1d-9464-4d5d-8f78-2ff9d30714bf\") " pod="tigera-operator/tigera-operator-755d956888-mnwbb" Sep 13 00:52:15.358961 kubelet[2459]: I0913 00:52:15.358927 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/97c98a1d-9464-4d5d-8f78-2ff9d30714bf-var-lib-calico\") pod \"tigera-operator-755d956888-mnwbb\" (UID: \"97c98a1d-9464-4d5d-8f78-2ff9d30714bf\") " pod="tigera-operator/tigera-operator-755d956888-mnwbb" Sep 13 00:52:15.363900 kubelet[2459]: I0913 00:52:15.363865 2459 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:52:15.556780 env[1460]: time="2025-09-13T00:52:15.556414143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r4mrs,Uid:df6cb482-9c92-4100-9ac7-530ff5816750,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:15.586274 env[1460]: time="2025-09-13T00:52:15.586201289Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:15.586274 env[1460]: time="2025-09-13T00:52:15.586237890Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:15.586485 env[1460]: time="2025-09-13T00:52:15.586445891Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:15.587658 env[1460]: time="2025-09-13T00:52:15.586692192Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cdc344e337086fbdcbd584afb3a1101ae1377b5389ff5709d2eb0a706672e87 pid=2512 runtime=io.containerd.runc.v2 Sep 13 00:52:15.604752 systemd[1]: Started cri-containerd-0cdc344e337086fbdcbd584afb3a1101ae1377b5389ff5709d2eb0a706672e87.scope. Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633918 kernel: audit: type=1400 audit(1757724735.617:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.634219 env[1460]: time="2025-09-13T00:52:15.634178126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-mnwbb,Uid:97c98a1d-9464-4d5d-8f78-2ff9d30714bf,Namespace:tigera-operator,Attempt:0,}" Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.664986 kernel: audit: type=1400 audit(1757724735.617:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.665076 kernel: audit: type=1400 audit(1757724735.617:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.682819 env[1460]: time="2025-09-13T00:52:15.678029842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r4mrs,Uid:df6cb482-9c92-4100-9ac7-530ff5816750,Namespace:kube-system,Attempt:0,} returns sandbox id \"0cdc344e337086fbdcbd584afb3a1101ae1377b5389ff5709d2eb0a706672e87\"" Sep 13 00:52:15.686320 kernel: audit: type=1400 audit(1757724735.617:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.687302 kernel: audit: type=1400 audit(1757724735.617:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.688718 env[1460]: time="2025-09-13T00:52:15.688689895Z" level=info msg="CreateContainer within sandbox \"0cdc344e337086fbdcbd584afb3a1101ae1377b5389ff5709d2eb0a706672e87\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:52:15.693126 env[1460]: time="2025-09-13T00:52:15.693081716Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:15.693261 env[1460]: time="2025-09-13T00:52:15.693240317Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:15.693345 env[1460]: time="2025-09-13T00:52:15.693328917Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:15.693540 env[1460]: time="2025-09-13T00:52:15.693518818Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6db39f552bd177c7968b2a4aa3a1cd5809ce1348fe69943d453b34ca0193080f pid=2553 runtime=io.containerd.runc.v2 Sep 13 00:52:15.704218 kernel: audit: type=1400 audit(1757724735.617:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.736649 kernel: audit: type=1400 audit(1757724735.617:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.739105 systemd[1]: Started cri-containerd-6db39f552bd177c7968b2a4aa3a1cd5809ce1348fe69943d453b34ca0193080f.scope. Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit: BPF prog-id=101 op=LOAD Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2512 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646333343465333337303836666264636264353834616662336131 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2512 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646333343465333337303836666264636264353834616662336131 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.617000 audit: BPF prog-id=102 op=LOAD Sep 13 00:52:15.617000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cd6f0 items=0 ppid=2512 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646333343465333337303836666264636264353834616662336131 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit: BPF prog-id=103 op=LOAD Sep 13 00:52:15.633000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cd738 items=0 ppid=2512 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646333343465333337303836666264636264353834616662336131 Sep 13 00:52:15.633000 audit: BPF prog-id=103 op=UNLOAD Sep 13 00:52:15.633000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.633000 audit: BPF prog-id=104 op=LOAD Sep 13 00:52:15.633000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cdb48 items=0 ppid=2512 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646333343465333337303836666264636264353834616662336131 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit: BPF prog-id=105 op=LOAD Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623339663535326264313737633739363862326134616133613163 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623339663535326264313737633739363862326134616133613163 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit: BPF prog-id=106 op=LOAD Sep 13 00:52:15.754000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000281c60 items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623339663535326264313737633739363862326134616133613163 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit: BPF prog-id=107 op=LOAD Sep 13 00:52:15.754000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000281ca8 items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623339663535326264313737633739363862326134616133613163 Sep 13 00:52:15.754000 audit: BPF prog-id=107 op=UNLOAD Sep 13 00:52:15.754000 audit: BPF prog-id=106 op=UNLOAD Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.754000 audit: BPF prog-id=108 op=LOAD Sep 13 00:52:15.754000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002fc0b8 items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623339663535326264313737633739363862326134616133613163 Sep 13 00:52:15.765929 env[1460]: time="2025-09-13T00:52:15.765884175Z" level=info msg="CreateContainer within sandbox \"0cdc344e337086fbdcbd584afb3a1101ae1377b5389ff5709d2eb0a706672e87\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a54c51c2b955681715ac7f9b10c6e4ca785dbf00f1d0eec5f001fc439a2921bd\"" Sep 13 00:52:15.768121 env[1460]: time="2025-09-13T00:52:15.768085986Z" level=info msg="StartContainer for \"a54c51c2b955681715ac7f9b10c6e4ca785dbf00f1d0eec5f001fc439a2921bd\"" Sep 13 00:52:15.796482 systemd[1]: Started cri-containerd-a54c51c2b955681715ac7f9b10c6e4ca785dbf00f1d0eec5f001fc439a2921bd.scope. Sep 13 00:52:15.798798 env[1460]: time="2025-09-13T00:52:15.798753637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-mnwbb,Uid:97c98a1d-9464-4d5d-8f78-2ff9d30714bf,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6db39f552bd177c7968b2a4aa3a1cd5809ce1348fe69943d453b34ca0193080f\"" Sep 13 00:52:15.815225 env[1460]: time="2025-09-13T00:52:15.812669805Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5fe9f972f8 items=0 ppid=2512 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135346335316332623935353638313731356163376639623130633665 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit: BPF prog-id=109 op=LOAD Sep 13 00:52:15.824000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243c8 items=0 ppid=2512 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135346335316332623935353638313731356163376639623130633665 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit: BPF prog-id=110 op=LOAD Sep 13 00:52:15.824000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024418 items=0 ppid=2512 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135346335316332623935353638313731356163376639623130633665 Sep 13 00:52:15.824000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:52:15.824000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:15.824000 audit: BPF prog-id=111 op=LOAD Sep 13 00:52:15.824000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000244a8 items=0 ppid=2512 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135346335316332623935353638313731356163376639623130633665 Sep 13 00:52:15.845848 env[1460]: time="2025-09-13T00:52:15.845803269Z" level=info msg="StartContainer for \"a54c51c2b955681715ac7f9b10c6e4ca785dbf00f1d0eec5f001fc439a2921bd\" returns successfully" Sep 13 00:52:15.964000 audit[2657]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:15.970029 kernel: kauditd_printk_skb: 150 callbacks suppressed Sep 13 00:52:15.970101 kernel: audit: type=1325 audit(1757724735.964:775): table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:15.964000 audit[2659]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.000657 kernel: audit: type=1325 audit(1757724735.964:776): table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:15.964000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff379df600 a2=0 a3=7fff379df5ec items=0 ppid=2605 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:16.037106 kernel: audit: type=1300 audit(1757724735.964:776): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff379df600 a2=0 a3=7fff379df5ec items=0 ppid=2605 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.037201 kernel: audit: type=1327 audit(1757724735.964:776): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:16.037238 kernel: audit: type=1300 audit(1757724735.964:775): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef9999df0 a2=0 a3=7ffef9999ddc items=0 ppid=2605 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.964000 audit[2657]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef9999df0 a2=0 a3=7ffef9999ddc items=0 ppid=2605 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:16.076180 kernel: audit: type=1327 audit(1757724735.964:775): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:16.076320 kernel: audit: type=1325 audit(1757724735.992:777): table=nat:43 family=10 entries=1 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:15.992000 audit[2661]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:15.992000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdaebb25d0 a2=0 a3=7ffdaebb25bc items=0 ppid=2605 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:16.125393 kernel: audit: type=1300 audit(1757724735.992:777): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdaebb25d0 a2=0 a3=7ffdaebb25bc items=0 ppid=2605 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.125502 kernel: audit: type=1327 audit(1757724735.992:777): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:16.001000 audit[2663]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.001000 audit[2663]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5522fac0 a2=0 a3=7ffc5522faac items=0 ppid=2605 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:16.001000 audit[2664]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.001000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca865c130 a2=0 a3=7ffca865c11c items=0 ppid=2605 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:52:16.011000 audit[2665]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.011000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe987af3d0 a2=0 a3=7ffe987af3bc items=0 ppid=2605 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:52:16.074000 audit[2666]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.074000 audit[2666]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc52711990 a2=0 a3=7ffc5271197c items=0 ppid=2605 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:52:16.138669 kernel: audit: type=1325 audit(1757724736.001:778): table=nat:44 family=2 entries=1 op=nft_register_chain pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.079000 audit[2668]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.079000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed93b77d0 a2=0 a3=7ffed93b77bc items=0 ppid=2605 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:52:16.084000 audit[2671]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.084000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7d654450 a2=0 a3=7ffd7d65443c items=0 ppid=2605 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:52:16.088000 audit[2672]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.088000 audit[2672]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa0eb1820 a2=0 a3=7fffa0eb180c items=0 ppid=2605 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:52:16.093000 audit[2674]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.093000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca8969ab0 a2=0 a3=7ffca8969a9c items=0 ppid=2605 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:52:16.095000 audit[2675]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.095000 audit[2675]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd118bd60 a2=0 a3=7ffcd118bd4c items=0 ppid=2605 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:52:16.099000 audit[2677]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.099000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe67b65eb0 a2=0 a3=7ffe67b65e9c items=0 ppid=2605 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:52:16.105000 audit[2680]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.105000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd2cc84610 a2=0 a3=7ffd2cc845fc items=0 ppid=2605 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:52:16.107000 audit[2681]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.107000 audit[2681]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff21034ff0 a2=0 a3=7fff21034fdc items=0 ppid=2605 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:52:16.112000 audit[2683]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.112000 audit[2683]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd75373ff0 a2=0 a3=7ffd75373fdc items=0 ppid=2605 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:52:16.113000 audit[2684]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.113000 audit[2684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd7682d10 a2=0 a3=7ffcd7682cfc items=0 ppid=2605 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:52:16.116000 audit[2686]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.116000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd049770c0 a2=0 a3=7ffd049770ac items=0 ppid=2605 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:16.120000 audit[2689]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.120000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd324fca20 a2=0 a3=7ffd324fca0c items=0 ppid=2605 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:16.126000 audit[2692]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.126000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc17411980 a2=0 a3=7ffc1741196c items=0 ppid=2605 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:52:16.139000 audit[2693]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.139000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff7df55770 a2=0 a3=7fff7df5575c items=0 ppid=2605 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:52:16.143000 audit[2695]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.143000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd60e53670 a2=0 a3=7ffd60e5365c items=0 ppid=2605 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:16.147000 audit[2698]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.147000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea5cb89c0 a2=0 a3=7ffea5cb89ac items=0 ppid=2605 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:16.148000 audit[2699]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.148000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfa634bf0 a2=0 a3=7ffcfa634bdc items=0 ppid=2605 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:52:16.151000 audit[2701]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:16.151000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdbc619c90 a2=0 a3=7ffdbc619c7c items=0 ppid=2605 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:52:16.246000 audit[2707]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:16.246000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdbf86d4f0 a2=0 a3=7ffdbf86d4dc items=0 ppid=2605 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:16.278000 audit[2707]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:16.278000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdbf86d4f0 a2=0 a3=7ffdbf86d4dc items=0 ppid=2605 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:16.280000 audit[2712]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.280000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc20e35040 a2=0 a3=7ffc20e3502c items=0 ppid=2605 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:52:16.283000 audit[2714]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.283000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5db58450 a2=0 a3=7ffc5db5843c items=0 ppid=2605 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:52:16.287000 audit[2717]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.287000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb72f6250 a2=0 a3=7ffdb72f623c items=0 ppid=2605 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:52:16.288000 audit[2718]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.288000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75952260 a2=0 a3=7ffd7595224c items=0 ppid=2605 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:52:16.291000 audit[2720]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.291000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe36272f70 a2=0 a3=7ffe36272f5c items=0 ppid=2605 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:52:16.293000 audit[2721]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.293000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd07c88470 a2=0 a3=7ffd07c8845c items=0 ppid=2605 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:52:16.296000 audit[2723]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.296000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde6af4110 a2=0 a3=7ffde6af40fc items=0 ppid=2605 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:52:16.299000 audit[2726]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.299000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe230fdec0 a2=0 a3=7ffe230fdeac items=0 ppid=2605 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:52:16.301000 audit[2727]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.301000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9f497560 a2=0 a3=7ffe9f49754c items=0 ppid=2605 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:52:16.304000 audit[2729]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.304000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd54560f0 a2=0 a3=7ffdd54560dc items=0 ppid=2605 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:52:16.305000 audit[2730]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.305000 audit[2730]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc8b14bc0 a2=0 a3=7fffc8b14bac items=0 ppid=2605 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:52:16.308000 audit[2732]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.308000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9bbb8840 a2=0 a3=7ffd9bbb882c items=0 ppid=2605 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:16.311000 audit[2735]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.311000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9214c6b0 a2=0 a3=7fff9214c69c items=0 ppid=2605 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:52:16.315000 audit[2738]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.315000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc21682da0 a2=0 a3=7ffc21682d8c items=0 ppid=2605 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:52:16.316000 audit[2739]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.316000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1311e260 a2=0 a3=7ffd1311e24c items=0 ppid=2605 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:52:16.318000 audit[2741]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.318000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff0bfac0c0 a2=0 a3=7fff0bfac0ac items=0 ppid=2605 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:16.322000 audit[2744]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.322000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1153dde0 a2=0 a3=7ffd1153ddcc items=0 ppid=2605 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:16.323000 audit[2745]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.323000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3a1d32c0 a2=0 a3=7fff3a1d32ac items=0 ppid=2605 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:52:16.326000 audit[2747]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.326000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1bda04a0 a2=0 a3=7ffe1bda048c items=0 ppid=2605 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:52:16.327000 audit[2748]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.327000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde21b4350 a2=0 a3=7ffde21b433c items=0 ppid=2605 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:52:16.331000 audit[2750]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.331000 audit[2750]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd638f92b0 a2=0 a3=7ffd638f929c items=0 ppid=2605 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:16.334000 audit[2753]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:16.334000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce0de2600 a2=0 a3=7ffce0de25ec items=0 ppid=2605 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:16.341000 audit[2755]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:52:16.341000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff7fdfb2f0 a2=0 a3=7fff7fdfb2dc items=0 ppid=2605 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.341000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:16.342000 audit[2755]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:52:16.342000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff7fdfb2f0 a2=0 a3=7fff7fdfb2dc items=0 ppid=2605 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.342000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:17.555770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2271517266.mount: Deactivated successfully. Sep 13 00:52:18.399104 env[1460]: time="2025-09-13T00:52:18.399062939Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:18.404265 env[1460]: time="2025-09-13T00:52:18.404226863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:18.407253 env[1460]: time="2025-09-13T00:52:18.407227376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:18.410126 env[1460]: time="2025-09-13T00:52:18.410097289Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:18.410648 env[1460]: time="2025-09-13T00:52:18.410612892Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 13 00:52:18.417237 env[1460]: time="2025-09-13T00:52:18.417206722Z" level=info msg="CreateContainer within sandbox \"6db39f552bd177c7968b2a4aa3a1cd5809ce1348fe69943d453b34ca0193080f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 13 00:52:18.435201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3696035806.mount: Deactivated successfully. Sep 13 00:52:18.452511 env[1460]: time="2025-09-13T00:52:18.452465983Z" level=info msg="CreateContainer within sandbox \"6db39f552bd177c7968b2a4aa3a1cd5809ce1348fe69943d453b34ca0193080f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fcf22688c9b6b44274e85bb64d5244a745babbc5e081ed0405832c1fbcd666f9\"" Sep 13 00:52:18.453284 env[1460]: time="2025-09-13T00:52:18.453039285Z" level=info msg="StartContainer for \"fcf22688c9b6b44274e85bb64d5244a745babbc5e081ed0405832c1fbcd666f9\"" Sep 13 00:52:18.470194 systemd[1]: Started cri-containerd-fcf22688c9b6b44274e85bb64d5244a745babbc5e081ed0405832c1fbcd666f9.scope. Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.486000 audit: BPF prog-id=112 op=LOAD Sep 13 00:52:18.486000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.486000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2553 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:18.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663232363838633962366234343237346538356262363464353234 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2553 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:18.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663232363838633962366234343237346538356262363464353234 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit: BPF prog-id=113 op=LOAD Sep 13 00:52:18.487000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026fdc0 items=0 ppid=2553 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:18.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663232363838633962366234343237346538356262363464353234 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.487000 audit: BPF prog-id=114 op=LOAD Sep 13 00:52:18.487000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026fe08 items=0 ppid=2553 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:18.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663232363838633962366234343237346538356262363464353234 Sep 13 00:52:18.488000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:52:18.488000 audit: BPF prog-id=113 op=UNLOAD Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:18.488000 audit: BPF prog-id=115 op=LOAD Sep 13 00:52:18.488000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000338218 items=0 ppid=2553 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:18.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663232363838633962366234343237346538356262363464353234 Sep 13 00:52:18.510379 env[1460]: time="2025-09-13T00:52:18.509852345Z" level=info msg="StartContainer for \"fcf22688c9b6b44274e85bb64d5244a745babbc5e081ed0405832c1fbcd666f9\" returns successfully" Sep 13 00:52:18.955672 kubelet[2459]: I0913 00:52:18.955608 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-r4mrs" podStartSLOduration=3.955588181 podStartE2EDuration="3.955588181s" podCreationTimestamp="2025-09-13 00:52:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:15.997325915 +0000 UTC m=+7.165342708" watchObservedRunningTime="2025-09-13 00:52:18.955588181 +0000 UTC m=+10.123604974" Sep 13 00:52:22.038313 kubelet[2459]: I0913 00:52:22.038242 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-755d956888-mnwbb" podStartSLOduration=4.427492534 podStartE2EDuration="7.038225883s" podCreationTimestamp="2025-09-13 00:52:15 +0000 UTC" firstStartedPulling="2025-09-13 00:52:15.800779147 +0000 UTC m=+6.968795940" lastFinishedPulling="2025-09-13 00:52:18.411512496 +0000 UTC m=+9.579529289" observedRunningTime="2025-09-13 00:52:18.998022175 +0000 UTC m=+10.166039068" watchObservedRunningTime="2025-09-13 00:52:22.038225883 +0000 UTC m=+13.206242676" Sep 13 00:52:24.856997 sudo[1766]: pam_unix(sudo:session): session closed for user root Sep 13 00:52:24.856000 audit[1766]: USER_END pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.863491 kernel: kauditd_printk_skb: 200 callbacks suppressed Sep 13 00:52:24.863566 kernel: audit: type=1106 audit(1757724744.856:844): pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.862000 audit[1766]: CRED_DISP pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.914867 kernel: audit: type=1104 audit(1757724744.862:845): pid=1766 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.964543 sshd[1763]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:24.964000 audit[1763]: USER_END pid=1763 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:24.966941 systemd[1]: sshd@6-10.200.4.44:22-10.200.16.10:52192.service: Deactivated successfully. Sep 13 00:52:24.991745 kernel: audit: type=1106 audit(1757724744.964:846): pid=1763 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:24.968161 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:52:24.968294 systemd[1]: session-9.scope: Consumed 5.054s CPU time. Sep 13 00:52:24.968881 systemd-logind[1433]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:52:24.969654 systemd-logind[1433]: Removed session 9. Sep 13 00:52:24.965000 audit[1763]: CRED_DISP pid=1763 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:25.018656 kernel: audit: type=1104 audit(1757724744.965:847): pid=1763 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:52:24.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.44:22-10.200.16.10:52192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:25.039655 kernel: audit: type=1131 audit(1757724744.966:848): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.44:22-10.200.16.10:52192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:25.741000 audit[2840]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:25.779653 kernel: audit: type=1325 audit(1757724745.741:849): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:25.741000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe415a7500 a2=0 a3=7ffe415a74ec items=0 ppid=2605 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:25.817649 kernel: audit: type=1300 audit(1757724745.741:849): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe415a7500 a2=0 a3=7ffe415a74ec items=0 ppid=2605 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:25.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:25.835649 kernel: audit: type=1327 audit(1757724745.741:849): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:25.818000 audit[2840]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:25.851648 kernel: audit: type=1325 audit(1757724745.818:850): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:25.818000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe415a7500 a2=0 a3=0 items=0 ppid=2605 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:25.880648 kernel: audit: type=1300 audit(1757724745.818:850): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe415a7500 a2=0 a3=0 items=0 ppid=2605 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:25.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:25.860000 audit[2842]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:25.860000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc80002810 a2=0 a3=7ffc800027fc items=0 ppid=2605 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:25.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:25.884000 audit[2842]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:25.884000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc80002810 a2=0 a3=0 items=0 ppid=2605 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:25.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.124000 audit[2846]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:29.124000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe28fc5710 a2=0 a3=7ffe28fc56fc items=0 ppid=2605 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.135000 audit[2846]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:29.135000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe28fc5710 a2=0 a3=0 items=0 ppid=2605 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.149000 audit[2848]: NETFILTER_CFG table=filter:98 family=2 entries=19 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:29.149000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffeaae96440 a2=0 a3=7ffeaae9642c items=0 ppid=2605 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.156000 audit[2848]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:29.156000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeaae96440 a2=0 a3=0 items=0 ppid=2605 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.181657 systemd[1]: Created slice kubepods-besteffort-pod869a6e95_5f10_4957_a6b0_97e5be1bcef5.slice. Sep 13 00:52:29.257100 kubelet[2459]: I0913 00:52:29.257065 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xgqhn\" (UniqueName: \"kubernetes.io/projected/869a6e95-5f10-4957-a6b0-97e5be1bcef5-kube-api-access-xgqhn\") pod \"calico-typha-54b7c98b86-gwdlw\" (UID: \"869a6e95-5f10-4957-a6b0-97e5be1bcef5\") " pod="calico-system/calico-typha-54b7c98b86-gwdlw" Sep 13 00:52:29.257431 kubelet[2459]: I0913 00:52:29.257111 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/869a6e95-5f10-4957-a6b0-97e5be1bcef5-typha-certs\") pod \"calico-typha-54b7c98b86-gwdlw\" (UID: \"869a6e95-5f10-4957-a6b0-97e5be1bcef5\") " pod="calico-system/calico-typha-54b7c98b86-gwdlw" Sep 13 00:52:29.257431 kubelet[2459]: I0913 00:52:29.257138 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/869a6e95-5f10-4957-a6b0-97e5be1bcef5-tigera-ca-bundle\") pod \"calico-typha-54b7c98b86-gwdlw\" (UID: \"869a6e95-5f10-4957-a6b0-97e5be1bcef5\") " pod="calico-system/calico-typha-54b7c98b86-gwdlw" Sep 13 00:52:29.460123 systemd[1]: Created slice kubepods-besteffort-pod3d6dd812_1443_42fc_8680_ff894914be36.slice. Sep 13 00:52:29.487596 env[1460]: time="2025-09-13T00:52:29.487041221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b7c98b86-gwdlw,Uid:869a6e95-5f10-4957-a6b0-97e5be1bcef5,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:29.518553 env[1460]: time="2025-09-13T00:52:29.517419227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:29.518553 env[1460]: time="2025-09-13T00:52:29.517488428Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:29.518553 env[1460]: time="2025-09-13T00:52:29.517523028Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:29.518553 env[1460]: time="2025-09-13T00:52:29.517694928Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d14115ee1f2db5f34edcad60592f6e778194782b6af2262f3716d9f8ffa39bbe pid=2858 runtime=io.containerd.runc.v2 Sep 13 00:52:29.536685 systemd[1]: Started cri-containerd-d14115ee1f2db5f34edcad60592f6e778194782b6af2262f3716d9f8ffa39bbe.scope. Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit: BPF prog-id=116 op=LOAD Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343131356565316632646235663334656463616436303539326636 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343131356565316632646235663334656463616436303539326636 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit: BPF prog-id=117 op=LOAD Sep 13 00:52:29.547000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030fa50 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343131356565316632646235663334656463616436303539326636 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.547000 audit: BPF prog-id=118 op=LOAD Sep 13 00:52:29.547000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030fa98 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343131356565316632646235663334656463616436303539326636 Sep 13 00:52:29.547000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:52:29.547000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.548000 audit: BPF prog-id=119 op=LOAD Sep 13 00:52:29.548000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030fea8 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343131356565316632646235663334656463616436303539326636 Sep 13 00:52:29.560241 kubelet[2459]: I0913 00:52:29.558407 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-var-run-calico\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560241 kubelet[2459]: I0913 00:52:29.558456 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-flexvol-driver-host\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560241 kubelet[2459]: I0913 00:52:29.558483 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-cni-bin-dir\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560241 kubelet[2459]: I0913 00:52:29.558504 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-cni-log-dir\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560241 kubelet[2459]: I0913 00:52:29.558528 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-cni-net-dir\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560532 kubelet[2459]: I0913 00:52:29.558552 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-lib-modules\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560532 kubelet[2459]: I0913 00:52:29.558575 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p2rd9\" (UniqueName: \"kubernetes.io/projected/3d6dd812-1443-42fc-8680-ff894914be36-kube-api-access-p2rd9\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560532 kubelet[2459]: I0913 00:52:29.558598 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-policysync\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560532 kubelet[2459]: I0913 00:52:29.558638 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3d6dd812-1443-42fc-8680-ff894914be36-tigera-ca-bundle\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560532 kubelet[2459]: I0913 00:52:29.558663 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-var-lib-calico\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560741 kubelet[2459]: I0913 00:52:29.558682 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3d6dd812-1443-42fc-8680-ff894914be36-xtables-lock\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.560741 kubelet[2459]: I0913 00:52:29.558706 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3d6dd812-1443-42fc-8680-ff894914be36-node-certs\") pod \"calico-node-svv2x\" (UID: \"3d6dd812-1443-42fc-8680-ff894914be36\") " pod="calico-system/calico-node-svv2x" Sep 13 00:52:29.584927 env[1460]: time="2025-09-13T00:52:29.584886964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b7c98b86-gwdlw,Uid:869a6e95-5f10-4957-a6b0-97e5be1bcef5,Namespace:calico-system,Attempt:0,} returns sandbox id \"d14115ee1f2db5f34edcad60592f6e778194782b6af2262f3716d9f8ffa39bbe\"" Sep 13 00:52:29.586535 env[1460]: time="2025-09-13T00:52:29.586495870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.661935 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.662870 kubelet[2459]: W0913 00:52:29.661971 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.662002 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.662230 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.662870 kubelet[2459]: W0913 00:52:29.662240 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.662253 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.662457 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.662870 kubelet[2459]: W0913 00:52:29.662468 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.662479 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.662870 kubelet[2459]: E0913 00:52:29.662747 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.663360 kubelet[2459]: W0913 00:52:29.662757 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.663360 kubelet[2459]: E0913 00:52:29.662769 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.663757 kubelet[2459]: E0913 00:52:29.663610 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.663757 kubelet[2459]: W0913 00:52:29.663645 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.663757 kubelet[2459]: E0913 00:52:29.663659 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.664042 kubelet[2459]: E0913 00:52:29.664033 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.664119 kubelet[2459]: W0913 00:52:29.664109 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.664194 kubelet[2459]: E0913 00:52:29.664184 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.664437 kubelet[2459]: E0913 00:52:29.664428 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.664522 kubelet[2459]: W0913 00:52:29.664512 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.664592 kubelet[2459]: E0913 00:52:29.664582 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.664848 kubelet[2459]: E0913 00:52:29.664840 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.665027 kubelet[2459]: W0913 00:52:29.665015 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.665108 kubelet[2459]: E0913 00:52:29.665098 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.666031 kubelet[2459]: E0913 00:52:29.666016 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.666131 kubelet[2459]: W0913 00:52:29.666120 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.666195 kubelet[2459]: E0913 00:52:29.666184 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.666830 kubelet[2459]: E0913 00:52:29.666818 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.666915 kubelet[2459]: W0913 00:52:29.666904 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.666980 kubelet[2459]: E0913 00:52:29.666971 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.681972 kubelet[2459]: E0913 00:52:29.679935 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.681972 kubelet[2459]: W0913 00:52:29.679952 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.681972 kubelet[2459]: E0913 00:52:29.679967 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.744569 kubelet[2459]: E0913 00:52:29.744462 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:29.744836 kubelet[2459]: E0913 00:52:29.744818 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.744917 kubelet[2459]: W0913 00:52:29.744839 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.744917 kubelet[2459]: E0913 00:52:29.744857 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.748827 kubelet[2459]: E0913 00:52:29.748805 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.748827 kubelet[2459]: W0913 00:52:29.748825 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.748975 kubelet[2459]: E0913 00:52:29.748841 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.749054 kubelet[2459]: E0913 00:52:29.749040 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.749106 kubelet[2459]: W0913 00:52:29.749056 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.749106 kubelet[2459]: E0913 00:52:29.749068 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.749343 kubelet[2459]: E0913 00:52:29.749329 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.749442 kubelet[2459]: W0913 00:52:29.749343 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.749442 kubelet[2459]: E0913 00:52:29.749356 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.749569 kubelet[2459]: E0913 00:52:29.749553 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.749569 kubelet[2459]: W0913 00:52:29.749568 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.749673 kubelet[2459]: E0913 00:52:29.749579 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.749773 kubelet[2459]: E0913 00:52:29.749761 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.749830 kubelet[2459]: W0913 00:52:29.749775 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.749830 kubelet[2459]: E0913 00:52:29.749786 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.750032 kubelet[2459]: E0913 00:52:29.750018 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.750111 kubelet[2459]: W0913 00:52:29.750033 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.750111 kubelet[2459]: E0913 00:52:29.750044 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.750246 kubelet[2459]: E0913 00:52:29.750221 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.750246 kubelet[2459]: W0913 00:52:29.750233 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.750246 kubelet[2459]: E0913 00:52:29.750244 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.750423 kubelet[2459]: E0913 00:52:29.750412 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.750483 kubelet[2459]: W0913 00:52:29.750425 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.750483 kubelet[2459]: E0913 00:52:29.750435 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.750602 kubelet[2459]: E0913 00:52:29.750590 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.750664 kubelet[2459]: W0913 00:52:29.750602 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.750664 kubelet[2459]: E0913 00:52:29.750612 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.750801 kubelet[2459]: E0913 00:52:29.750781 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.750801 kubelet[2459]: W0913 00:52:29.750794 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.750913 kubelet[2459]: E0913 00:52:29.750803 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.750979 kubelet[2459]: E0913 00:52:29.750964 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.750979 kubelet[2459]: W0913 00:52:29.750977 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.751112 kubelet[2459]: E0913 00:52:29.750987 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.751201 kubelet[2459]: E0913 00:52:29.751187 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.751252 kubelet[2459]: W0913 00:52:29.751203 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.751252 kubelet[2459]: E0913 00:52:29.751214 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.751388 kubelet[2459]: E0913 00:52:29.751375 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.751433 kubelet[2459]: W0913 00:52:29.751389 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.751433 kubelet[2459]: E0913 00:52:29.751399 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.751610 kubelet[2459]: E0913 00:52:29.751592 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.751610 kubelet[2459]: W0913 00:52:29.751606 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.751729 kubelet[2459]: E0913 00:52:29.751617 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.751803 kubelet[2459]: E0913 00:52:29.751791 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.751846 kubelet[2459]: W0913 00:52:29.751804 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.751846 kubelet[2459]: E0913 00:52:29.751814 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.752000 kubelet[2459]: E0913 00:52:29.751986 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.752050 kubelet[2459]: W0913 00:52:29.752001 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.752050 kubelet[2459]: E0913 00:52:29.752011 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.752198 kubelet[2459]: E0913 00:52:29.752183 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.752198 kubelet[2459]: W0913 00:52:29.752197 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.752283 kubelet[2459]: E0913 00:52:29.752209 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.753100 kubelet[2459]: E0913 00:52:29.753078 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.753100 kubelet[2459]: W0913 00:52:29.753099 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.753241 kubelet[2459]: E0913 00:52:29.753113 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.753326 kubelet[2459]: E0913 00:52:29.753312 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.753386 kubelet[2459]: W0913 00:52:29.753327 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.753386 kubelet[2459]: E0913 00:52:29.753338 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.761521 kubelet[2459]: E0913 00:52:29.761493 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.761521 kubelet[2459]: W0913 00:52:29.761509 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.761667 kubelet[2459]: E0913 00:52:29.761522 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.761667 kubelet[2459]: I0913 00:52:29.761551 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/139bb3f6-e4bb-4467-b6cc-4bdf44d43b16-kubelet-dir\") pod \"csi-node-driver-p988w\" (UID: \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\") " pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:29.761914 kubelet[2459]: E0913 00:52:29.761896 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.761914 kubelet[2459]: W0913 00:52:29.761910 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.762024 kubelet[2459]: E0913 00:52:29.761924 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.762024 kubelet[2459]: I0913 00:52:29.761949 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/139bb3f6-e4bb-4467-b6cc-4bdf44d43b16-socket-dir\") pod \"csi-node-driver-p988w\" (UID: \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\") " pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:29.762296 kubelet[2459]: E0913 00:52:29.762279 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.762354 kubelet[2459]: W0913 00:52:29.762296 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.762354 kubelet[2459]: E0913 00:52:29.762308 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.762354 kubelet[2459]: I0913 00:52:29.762331 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/139bb3f6-e4bb-4467-b6cc-4bdf44d43b16-varrun\") pod \"csi-node-driver-p988w\" (UID: \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\") " pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:29.763217 kubelet[2459]: E0913 00:52:29.763200 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.763217 kubelet[2459]: W0913 00:52:29.763217 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.763349 kubelet[2459]: E0913 00:52:29.763231 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.763349 kubelet[2459]: I0913 00:52:29.763255 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9fk48\" (UniqueName: \"kubernetes.io/projected/139bb3f6-e4bb-4467-b6cc-4bdf44d43b16-kube-api-access-9fk48\") pod \"csi-node-driver-p988w\" (UID: \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\") " pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:29.763564 kubelet[2459]: E0913 00:52:29.763549 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.763647 kubelet[2459]: W0913 00:52:29.763564 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.763647 kubelet[2459]: E0913 00:52:29.763576 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.764695 kubelet[2459]: I0913 00:52:29.764045 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/139bb3f6-e4bb-4467-b6cc-4bdf44d43b16-registration-dir\") pod \"csi-node-driver-p988w\" (UID: \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\") " pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:29.764695 kubelet[2459]: E0913 00:52:29.764199 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.764695 kubelet[2459]: W0913 00:52:29.764207 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.764695 kubelet[2459]: E0913 00:52:29.764218 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.764894 env[1460]: time="2025-09-13T00:52:29.764288793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-svv2x,Uid:3d6dd812-1443-42fc-8680-ff894914be36,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:29.765129 kubelet[2459]: E0913 00:52:29.765114 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.765129 kubelet[2459]: W0913 00:52:29.765129 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.765302 kubelet[2459]: E0913 00:52:29.765142 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.765520 kubelet[2459]: E0913 00:52:29.765493 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.765520 kubelet[2459]: W0913 00:52:29.765505 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.765520 kubelet[2459]: E0913 00:52:29.765518 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.765850 kubelet[2459]: E0913 00:52:29.765836 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.765850 kubelet[2459]: W0913 00:52:29.765849 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.765985 kubelet[2459]: E0913 00:52:29.765861 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.766227 kubelet[2459]: E0913 00:52:29.766208 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.766227 kubelet[2459]: W0913 00:52:29.766221 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.766346 kubelet[2459]: E0913 00:52:29.766234 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.766550 kubelet[2459]: E0913 00:52:29.766528 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.766550 kubelet[2459]: W0913 00:52:29.766547 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.766685 kubelet[2459]: E0913 00:52:29.766558 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.766907 kubelet[2459]: E0913 00:52:29.766881 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.766907 kubelet[2459]: W0913 00:52:29.766894 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.767050 kubelet[2459]: E0913 00:52:29.766913 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.767315 kubelet[2459]: E0913 00:52:29.767292 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.767401 kubelet[2459]: W0913 00:52:29.767390 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.767482 kubelet[2459]: E0913 00:52:29.767471 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.767882 kubelet[2459]: E0913 00:52:29.767869 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.767984 kubelet[2459]: W0913 00:52:29.767972 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.768075 kubelet[2459]: E0913 00:52:29.768064 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.768380 kubelet[2459]: E0913 00:52:29.768361 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.768475 kubelet[2459]: W0913 00:52:29.768463 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.768558 kubelet[2459]: E0913 00:52:29.768546 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.790983 env[1460]: time="2025-09-13T00:52:29.790902486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:29.791184 env[1460]: time="2025-09-13T00:52:29.791145787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:29.791280 env[1460]: time="2025-09-13T00:52:29.791175887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:29.791486 env[1460]: time="2025-09-13T00:52:29.791454188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e pid=2949 runtime=io.containerd.runc.v2 Sep 13 00:52:29.803751 systemd[1]: Started cri-containerd-1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e.scope. Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit: BPF prog-id=120 op=LOAD Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2949 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396635326465363739393835656463373565393562626663666365 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2949 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396635326465363739393835656463373565393562626663666365 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.823000 audit: BPF prog-id=121 op=LOAD Sep 13 00:52:29.823000 audit[2959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000325d00 items=0 ppid=2949 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396635326465363739393835656463373565393562626663666365 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit: BPF prog-id=122 op=LOAD Sep 13 00:52:29.824000 audit[2959]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000325d48 items=0 ppid=2949 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396635326465363739393835656463373565393562626663666365 Sep 13 00:52:29.824000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:52:29.824000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { perfmon } for pid=2959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit[2959]: AVC avc: denied { bpf } for pid=2959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.824000 audit: BPF prog-id=123 op=LOAD Sep 13 00:52:29.824000 audit[2959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000380158 items=0 ppid=2949 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396635326465363739393835656463373565393562626663666365 Sep 13 00:52:29.848653 env[1460]: time="2025-09-13T00:52:29.848603088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-svv2x,Uid:3d6dd812-1443-42fc-8680-ff894914be36,Namespace:calico-system,Attempt:0,} returns sandbox id \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\"" Sep 13 00:52:29.865143 kubelet[2459]: E0913 00:52:29.864914 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.865143 kubelet[2459]: W0913 00:52:29.864931 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.865143 kubelet[2459]: E0913 00:52:29.864953 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.865387 kubelet[2459]: E0913 00:52:29.865155 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.865387 kubelet[2459]: W0913 00:52:29.865166 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.865387 kubelet[2459]: E0913 00:52:29.865178 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.865513 kubelet[2459]: E0913 00:52:29.865403 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.865513 kubelet[2459]: W0913 00:52:29.865412 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.865513 kubelet[2459]: E0913 00:52:29.865423 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.865657 kubelet[2459]: E0913 00:52:29.865645 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.865657 kubelet[2459]: W0913 00:52:29.865654 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.865743 kubelet[2459]: E0913 00:52:29.865665 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.865888 kubelet[2459]: E0913 00:52:29.865859 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.865888 kubelet[2459]: W0913 00:52:29.865872 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.865888 kubelet[2459]: E0913 00:52:29.865882 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.866129 kubelet[2459]: E0913 00:52:29.866114 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.866189 kubelet[2459]: W0913 00:52:29.866128 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.866189 kubelet[2459]: E0913 00:52:29.866140 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.866337 kubelet[2459]: E0913 00:52:29.866321 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.866337 kubelet[2459]: W0913 00:52:29.866332 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.866428 kubelet[2459]: E0913 00:52:29.866343 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.866527 kubelet[2459]: E0913 00:52:29.866511 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.866527 kubelet[2459]: W0913 00:52:29.866522 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.866618 kubelet[2459]: E0913 00:52:29.866532 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.866739 kubelet[2459]: E0913 00:52:29.866723 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.866739 kubelet[2459]: W0913 00:52:29.866735 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.866834 kubelet[2459]: E0913 00:52:29.866746 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.866927 kubelet[2459]: E0913 00:52:29.866911 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.866927 kubelet[2459]: W0913 00:52:29.866923 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.867029 kubelet[2459]: E0913 00:52:29.866933 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.867113 kubelet[2459]: E0913 00:52:29.867098 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.867113 kubelet[2459]: W0913 00:52:29.867109 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.867206 kubelet[2459]: E0913 00:52:29.867119 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.867298 kubelet[2459]: E0913 00:52:29.867282 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.867298 kubelet[2459]: W0913 00:52:29.867293 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.867383 kubelet[2459]: E0913 00:52:29.867305 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.867536 kubelet[2459]: E0913 00:52:29.867522 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.867536 kubelet[2459]: W0913 00:52:29.867534 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.867660 kubelet[2459]: E0913 00:52:29.867544 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.867755 kubelet[2459]: E0913 00:52:29.867741 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.867755 kubelet[2459]: W0913 00:52:29.867753 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.867845 kubelet[2459]: E0913 00:52:29.867763 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.867945 kubelet[2459]: E0913 00:52:29.867930 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.867945 kubelet[2459]: W0913 00:52:29.867941 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.868041 kubelet[2459]: E0913 00:52:29.867951 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.868142 kubelet[2459]: E0913 00:52:29.868123 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.868142 kubelet[2459]: W0913 00:52:29.868134 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.868232 kubelet[2459]: E0913 00:52:29.868148 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.868355 kubelet[2459]: E0913 00:52:29.868339 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.868407 kubelet[2459]: W0913 00:52:29.868354 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.868407 kubelet[2459]: E0913 00:52:29.868365 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.868539 kubelet[2459]: E0913 00:52:29.868524 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.868539 kubelet[2459]: W0913 00:52:29.868535 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.868625 kubelet[2459]: E0913 00:52:29.868544 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.868770 kubelet[2459]: E0913 00:52:29.868754 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.868770 kubelet[2459]: W0913 00:52:29.868765 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.868858 kubelet[2459]: E0913 00:52:29.868775 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.868995 kubelet[2459]: E0913 00:52:29.868969 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.868995 kubelet[2459]: W0913 00:52:29.868980 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.868995 kubelet[2459]: E0913 00:52:29.868989 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.869311 kubelet[2459]: E0913 00:52:29.869295 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.869311 kubelet[2459]: W0913 00:52:29.869307 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.869486 kubelet[2459]: E0913 00:52:29.869318 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.869564 kubelet[2459]: E0913 00:52:29.869547 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.869564 kubelet[2459]: W0913 00:52:29.869560 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.869678 kubelet[2459]: E0913 00:52:29.869570 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.869823 kubelet[2459]: E0913 00:52:29.869808 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.869823 kubelet[2459]: W0913 00:52:29.869821 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.869917 kubelet[2459]: E0913 00:52:29.869831 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.870059 kubelet[2459]: E0913 00:52:29.870033 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.870059 kubelet[2459]: W0913 00:52:29.870044 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.870059 kubelet[2459]: E0913 00:52:29.870054 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.871093 kubelet[2459]: E0913 00:52:29.870533 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.871093 kubelet[2459]: W0913 00:52:29.870546 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.871093 kubelet[2459]: E0913 00:52:29.870558 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:29.877440 kubelet[2459]: E0913 00:52:29.877419 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:29.877440 kubelet[2459]: W0913 00:52:29.877434 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:29.879036 kubelet[2459]: E0913 00:52:29.877447 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:30.168000 audit[3009]: NETFILTER_CFG table=filter:100 family=2 entries=21 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:30.174355 kernel: kauditd_printk_skb: 133 callbacks suppressed Sep 13 00:52:30.174485 kernel: audit: type=1325 audit(1757724750.168:893): table=filter:100 family=2 entries=21 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:30.168000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdc609c030 a2=0 a3=7ffdc609c01c items=0 ppid=2605 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.208611 kernel: audit: type=1300 audit(1757724750.168:893): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdc609c030 a2=0 a3=7ffdc609c01c items=0 ppid=2605 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.208750 kernel: audit: type=1327 audit(1757724750.168:893): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:30.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:30.225688 kernel: audit: type=1325 audit(1757724750.185:894): table=nat:101 family=2 entries=12 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:30.185000 audit[3009]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:30.185000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc609c030 a2=0 a3=0 items=0 ppid=2605 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.256647 kernel: audit: type=1300 audit(1757724750.185:894): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc609c030 a2=0 a3=0 items=0 ppid=2605 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.256767 kernel: audit: type=1327 audit(1757724750.185:894): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:30.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:30.953704 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3068386474.mount: Deactivated successfully. Sep 13 00:52:31.944013 kubelet[2459]: E0913 00:52:31.943967 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:32.526731 env[1460]: time="2025-09-13T00:52:32.526686019Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.531925 env[1460]: time="2025-09-13T00:52:32.531886936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.534788 env[1460]: time="2025-09-13T00:52:32.534756146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.537653 env[1460]: time="2025-09-13T00:52:32.537613455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.538052 env[1460]: time="2025-09-13T00:52:32.538024657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 13 00:52:32.541918 env[1460]: time="2025-09-13T00:52:32.541880169Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:52:32.563451 env[1460]: time="2025-09-13T00:52:32.563399040Z" level=info msg="CreateContainer within sandbox \"d14115ee1f2db5f34edcad60592f6e778194782b6af2262f3716d9f8ffa39bbe\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 13 00:52:32.600346 env[1460]: time="2025-09-13T00:52:32.600300360Z" level=info msg="CreateContainer within sandbox \"d14115ee1f2db5f34edcad60592f6e778194782b6af2262f3716d9f8ffa39bbe\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b23e2aecb4744be541246b774aff355c8176b091947f85e42013a89b77a5e0b8\"" Sep 13 00:52:32.600922 env[1460]: time="2025-09-13T00:52:32.600890662Z" level=info msg="StartContainer for \"b23e2aecb4744be541246b774aff355c8176b091947f85e42013a89b77a5e0b8\"" Sep 13 00:52:32.625467 systemd[1]: Started cri-containerd-b23e2aecb4744be541246b774aff355c8176b091947f85e42013a89b77a5e0b8.scope. Sep 13 00:52:32.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.667685 kernel: audit: type=1400 audit(1757724752.651:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.691792 kernel: audit: type=1400 audit(1757724752.652:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.708648 kernel: audit: type=1400 audit(1757724752.652:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.726792 kernel: audit: type=1400 audit(1757724752.652:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit: BPF prog-id=124 op=LOAD Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2858 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232336532616563623437343462653534313234366237373461666633 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2858 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232336532616563623437343462653534313234366237373461666633 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit: BPF prog-id=125 op=LOAD Sep 13 00:52:32.668000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3950 items=0 ppid=2858 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232336532616563623437343462653534313234366237373461666633 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit: BPF prog-id=126 op=LOAD Sep 13 00:52:32.668000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3998 items=0 ppid=2858 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232336532616563623437343462653534313234366237373461666633 Sep 13 00:52:32.668000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:52:32.668000 audit: BPF prog-id=125 op=UNLOAD Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.668000 audit: BPF prog-id=127 op=LOAD Sep 13 00:52:32.668000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3da8 items=0 ppid=2858 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232336532616563623437343462653534313234366237373461666633 Sep 13 00:52:32.772365 env[1460]: time="2025-09-13T00:52:32.772317424Z" level=info msg="StartContainer for \"b23e2aecb4744be541246b774aff355c8176b091947f85e42013a89b77a5e0b8\" returns successfully" Sep 13 00:52:33.025824 kubelet[2459]: I0913 00:52:33.025752 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-54b7c98b86-gwdlw" podStartSLOduration=1.07264576 podStartE2EDuration="4.025731752s" podCreationTimestamp="2025-09-13 00:52:29 +0000 UTC" firstStartedPulling="2025-09-13 00:52:29.586106168 +0000 UTC m=+20.754122961" lastFinishedPulling="2025-09-13 00:52:32.53919206 +0000 UTC m=+23.707208953" observedRunningTime="2025-09-13 00:52:33.02530345 +0000 UTC m=+24.193320343" watchObservedRunningTime="2025-09-13 00:52:33.025731752 +0000 UTC m=+24.193748545" Sep 13 00:52:33.075179 kubelet[2459]: E0913 00:52:33.075128 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.075179 kubelet[2459]: W0913 00:52:33.075177 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.075410 kubelet[2459]: E0913 00:52:33.075201 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.075498 kubelet[2459]: E0913 00:52:33.075477 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.075498 kubelet[2459]: W0913 00:52:33.075493 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.075654 kubelet[2459]: E0913 00:52:33.075506 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.075753 kubelet[2459]: E0913 00:52:33.075737 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.075808 kubelet[2459]: W0913 00:52:33.075753 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.075808 kubelet[2459]: E0913 00:52:33.075765 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.075973 kubelet[2459]: E0913 00:52:33.075959 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.076032 kubelet[2459]: W0913 00:52:33.075973 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.076032 kubelet[2459]: E0913 00:52:33.075983 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.076221 kubelet[2459]: E0913 00:52:33.076194 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.076221 kubelet[2459]: W0913 00:52:33.076209 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.076221 kubelet[2459]: E0913 00:52:33.076219 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.076456 kubelet[2459]: E0913 00:52:33.076442 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.076456 kubelet[2459]: W0913 00:52:33.076456 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.076557 kubelet[2459]: E0913 00:52:33.076466 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.076668 kubelet[2459]: E0913 00:52:33.076655 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.076731 kubelet[2459]: W0913 00:52:33.076669 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.076731 kubelet[2459]: E0913 00:52:33.076679 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.077311 kubelet[2459]: E0913 00:52:33.077290 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.077400 kubelet[2459]: W0913 00:52:33.077318 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.077400 kubelet[2459]: E0913 00:52:33.077332 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.077620 kubelet[2459]: E0913 00:52:33.077604 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.077713 kubelet[2459]: W0913 00:52:33.077622 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.077713 kubelet[2459]: E0913 00:52:33.077655 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.077863 kubelet[2459]: E0913 00:52:33.077850 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.077910 kubelet[2459]: W0913 00:52:33.077863 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.077910 kubelet[2459]: E0913 00:52:33.077874 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.078081 kubelet[2459]: E0913 00:52:33.078067 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.078138 kubelet[2459]: W0913 00:52:33.078081 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.078138 kubelet[2459]: E0913 00:52:33.078092 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.078297 kubelet[2459]: E0913 00:52:33.078284 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.078342 kubelet[2459]: W0913 00:52:33.078298 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.078342 kubelet[2459]: E0913 00:52:33.078309 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.078512 kubelet[2459]: E0913 00:52:33.078499 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.078563 kubelet[2459]: W0913 00:52:33.078513 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.078563 kubelet[2459]: E0913 00:52:33.078524 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.078769 kubelet[2459]: E0913 00:52:33.078756 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.078816 kubelet[2459]: W0913 00:52:33.078770 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.078816 kubelet[2459]: E0913 00:52:33.078781 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.078974 kubelet[2459]: E0913 00:52:33.078962 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.079028 kubelet[2459]: W0913 00:52:33.078975 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.079028 kubelet[2459]: E0913 00:52:33.078985 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.095250 kubelet[2459]: E0913 00:52:33.095226 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.095250 kubelet[2459]: W0913 00:52:33.095244 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.095442 kubelet[2459]: E0913 00:52:33.095263 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.095547 kubelet[2459]: E0913 00:52:33.095529 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.095547 kubelet[2459]: W0913 00:52:33.095543 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.095651 kubelet[2459]: E0913 00:52:33.095555 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.095800 kubelet[2459]: E0913 00:52:33.095782 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.095800 kubelet[2459]: W0913 00:52:33.095795 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.095880 kubelet[2459]: E0913 00:52:33.095808 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.096036 kubelet[2459]: E0913 00:52:33.096023 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.096036 kubelet[2459]: W0913 00:52:33.096034 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.096128 kubelet[2459]: E0913 00:52:33.096045 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.096262 kubelet[2459]: E0913 00:52:33.096247 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.096262 kubelet[2459]: W0913 00:52:33.096261 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.096351 kubelet[2459]: E0913 00:52:33.096271 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.096480 kubelet[2459]: E0913 00:52:33.096466 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.096480 kubelet[2459]: W0913 00:52:33.096476 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.096580 kubelet[2459]: E0913 00:52:33.096487 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.096740 kubelet[2459]: E0913 00:52:33.096724 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.096792 kubelet[2459]: W0913 00:52:33.096740 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.096792 kubelet[2459]: E0913 00:52:33.096751 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.097138 kubelet[2459]: E0913 00:52:33.097120 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.097138 kubelet[2459]: W0913 00:52:33.097137 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.097246 kubelet[2459]: E0913 00:52:33.097148 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.097401 kubelet[2459]: E0913 00:52:33.097348 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.097401 kubelet[2459]: W0913 00:52:33.097356 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.097401 kubelet[2459]: E0913 00:52:33.097365 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.097551 kubelet[2459]: E0913 00:52:33.097538 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.097592 kubelet[2459]: W0913 00:52:33.097552 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.097592 kubelet[2459]: E0913 00:52:33.097562 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.097784 kubelet[2459]: E0913 00:52:33.097769 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.097838 kubelet[2459]: W0913 00:52:33.097785 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.097838 kubelet[2459]: E0913 00:52:33.097795 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.097996 kubelet[2459]: E0913 00:52:33.097983 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.098045 kubelet[2459]: W0913 00:52:33.097997 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.098045 kubelet[2459]: E0913 00:52:33.098007 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.098228 kubelet[2459]: E0913 00:52:33.098216 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.098274 kubelet[2459]: W0913 00:52:33.098229 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.098274 kubelet[2459]: E0913 00:52:33.098240 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.099517 kubelet[2459]: E0913 00:52:33.099496 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.099517 kubelet[2459]: W0913 00:52:33.099515 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.099665 kubelet[2459]: E0913 00:52:33.099529 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.100932 kubelet[2459]: E0913 00:52:33.100912 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.100932 kubelet[2459]: W0913 00:52:33.100931 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.101062 kubelet[2459]: E0913 00:52:33.100945 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.101146 kubelet[2459]: E0913 00:52:33.101133 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.101199 kubelet[2459]: W0913 00:52:33.101150 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.101199 kubelet[2459]: E0913 00:52:33.101162 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.101374 kubelet[2459]: E0913 00:52:33.101359 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.101427 kubelet[2459]: W0913 00:52:33.101375 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.101427 kubelet[2459]: E0913 00:52:33.101386 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.104388 kubelet[2459]: E0913 00:52:33.104369 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:33.104388 kubelet[2459]: W0913 00:52:33.104382 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:33.104487 kubelet[2459]: E0913 00:52:33.104396 2459 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:33.889684 env[1460]: time="2025-09-13T00:52:33.889638619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:33.894000 env[1460]: time="2025-09-13T00:52:33.893964732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:33.896950 env[1460]: time="2025-09-13T00:52:33.896914942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:33.899879 env[1460]: time="2025-09-13T00:52:33.899844251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:33.900355 env[1460]: time="2025-09-13T00:52:33.900320453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:52:33.907538 env[1460]: time="2025-09-13T00:52:33.907496076Z" level=info msg="CreateContainer within sandbox \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:52:33.936267 env[1460]: time="2025-09-13T00:52:33.936222768Z" level=info msg="CreateContainer within sandbox \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2\"" Sep 13 00:52:33.937051 env[1460]: time="2025-09-13T00:52:33.937017470Z" level=info msg="StartContainer for \"fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2\"" Sep 13 00:52:33.948717 kubelet[2459]: E0913 00:52:33.947227 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:33.959825 systemd[1]: Started cri-containerd-fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2.scope. Sep 13 00:52:33.971055 systemd[1]: run-containerd-runc-k8s.io-fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2-runc.bbEDMR.mount: Deactivated successfully. Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f67a41fb1a8 items=0 ppid=2949 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:33.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656131623835363332383264363037326234653936363862326361 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit: BPF prog-id=128 op=LOAD Sep 13 00:52:33.988000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000fdc78 items=0 ppid=2949 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:33.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656131623835363332383264363037326234653936363862326361 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit: BPF prog-id=129 op=LOAD Sep 13 00:52:33.988000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000fdcc8 items=0 ppid=2949 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:33.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656131623835363332383264363037326234653936363862326361 Sep 13 00:52:33.988000 audit: BPF prog-id=129 op=UNLOAD Sep 13 00:52:33.988000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:33.988000 audit: BPF prog-id=130 op=LOAD Sep 13 00:52:33.988000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000fdd58 items=0 ppid=2949 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:33.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656131623835363332383264363037326234653936363862326361 Sep 13 00:52:34.008657 env[1460]: time="2025-09-13T00:52:34.008108097Z" level=info msg="StartContainer for \"fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2\" returns successfully" Sep 13 00:52:34.014127 kubelet[2459]: I0913 00:52:34.014098 2459 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:52:34.028922 systemd[1]: cri-containerd-fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2.scope: Deactivated successfully. Sep 13 00:52:34.031000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:52:34.052044 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2-rootfs.mount: Deactivated successfully. Sep 13 00:52:35.487268 env[1460]: time="2025-09-13T00:52:35.487209798Z" level=info msg="shim disconnected" id=fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2 Sep 13 00:52:35.487268 env[1460]: time="2025-09-13T00:52:35.487260598Z" level=warning msg="cleaning up after shim disconnected" id=fcea1b8563282d6072b4e9668b2ca179dcc7e1170c29440de1f82497c96370c2 namespace=k8s.io Sep 13 00:52:35.487268 env[1460]: time="2025-09-13T00:52:35.487271798Z" level=info msg="cleaning up dead shim" Sep 13 00:52:35.495048 env[1460]: time="2025-09-13T00:52:35.495005522Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:52:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3140 runtime=io.containerd.runc.v2\n" Sep 13 00:52:35.944126 kubelet[2459]: E0913 00:52:35.944077 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:36.019494 env[1460]: time="2025-09-13T00:52:36.019453428Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:52:37.944237 kubelet[2459]: E0913 00:52:37.944184 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:39.944740 kubelet[2459]: E0913 00:52:39.944702 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:40.566258 env[1460]: time="2025-09-13T00:52:40.566215254Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.571500 env[1460]: time="2025-09-13T00:52:40.571462669Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.578138 env[1460]: time="2025-09-13T00:52:40.578103687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.581970 env[1460]: time="2025-09-13T00:52:40.581924097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:40.582455 env[1460]: time="2025-09-13T00:52:40.582413099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:52:40.590561 env[1460]: time="2025-09-13T00:52:40.590521821Z" level=info msg="CreateContainer within sandbox \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:52:40.621557 env[1460]: time="2025-09-13T00:52:40.621514407Z" level=info msg="CreateContainer within sandbox \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb\"" Sep 13 00:52:40.623410 env[1460]: time="2025-09-13T00:52:40.623373612Z" level=info msg="StartContainer for \"912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb\"" Sep 13 00:52:40.645577 systemd[1]: Started cri-containerd-912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb.scope. Sep 13 00:52:40.686260 kernel: kauditd_printk_skb: 97 callbacks suppressed Sep 13 00:52:40.686421 kernel: audit: type=1400 audit(1757724760.665:920): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcd38c2c458 items=0 ppid=2949 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.709988 kernel: audit: type=1300 audit(1757724760.665:920): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcd38c2c458 items=0 ppid=2949 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323738376333613133386536366362356361323739376339663933 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.752763 kernel: audit: type=1327 audit(1757724760.665:920): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323738376333613133386536366362356361323739376339663933 Sep 13 00:52:40.752866 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.770823 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.785525 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.802781 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.803105 env[1460]: time="2025-09-13T00:52:40.803022307Z" level=info msg="StartContainer for \"912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb\" returns successfully" Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.823318 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.855713 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.855819 kernel: audit: type=1400 audit(1757724760.665:921): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.665000 audit: BPF prog-id=131 op=LOAD Sep 13 00:52:40.665000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002a1318 items=0 ppid=2949 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323738376333613133386536366362356361323739376339663933 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit: BPF prog-id=132 op=LOAD Sep 13 00:52:40.685000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002a1368 items=0 ppid=2949 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323738376333613133386536366362356361323739376339663933 Sep 13 00:52:40.685000 audit: BPF prog-id=132 op=UNLOAD Sep 13 00:52:40.685000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:40.685000 audit: BPF prog-id=133 op=LOAD Sep 13 00:52:40.685000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002a13f8 items=0 ppid=2949 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:40.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323738376333613133386536366362356361323739376339663933 Sep 13 00:52:41.944223 kubelet[2459]: E0913 00:52:41.944180 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:42.361360 env[1460]: time="2025-09-13T00:52:42.361291007Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:52:42.363584 systemd[1]: cri-containerd-912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb.scope: Deactivated successfully. Sep 13 00:52:42.369000 audit: BPF prog-id=133 op=UNLOAD Sep 13 00:52:42.386237 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb-rootfs.mount: Deactivated successfully. Sep 13 00:52:42.392669 kubelet[2459]: I0913 00:52:42.390705 2459 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:52:43.633000 systemd[1]: Created slice kubepods-burstable-pod3c6f78d0_da77_44c3_b47d_2022e353b3d8.slice. Sep 13 00:52:43.637594 env[1460]: time="2025-09-13T00:52:43.637538051Z" level=info msg="shim disconnected" id=912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb Sep 13 00:52:43.637993 env[1460]: time="2025-09-13T00:52:43.637596351Z" level=warning msg="cleaning up after shim disconnected" id=912787c3a138e66cb5ca2797c9f93d8eecaa40cc974d4bdef250b33ca66ffcfb namespace=k8s.io Sep 13 00:52:43.637993 env[1460]: time="2025-09-13T00:52:43.637610251Z" level=info msg="cleaning up dead shim" Sep 13 00:52:43.648503 systemd[1]: Created slice kubepods-besteffort-pod139bb3f6_e4bb_4467_b6cc_4bdf44d43b16.slice. Sep 13 00:52:43.654901 env[1460]: time="2025-09-13T00:52:43.654829796Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:52:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3200 runtime=io.containerd.runc.v2\n" Sep 13 00:52:43.661767 kubelet[2459]: I0913 00:52:43.661569 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lmgkl\" (UniqueName: \"kubernetes.io/projected/c4ac56c6-a9c7-487c-93cf-6f44f00818a0-kube-api-access-lmgkl\") pod \"coredns-674b8bbfcf-jlkth\" (UID: \"c4ac56c6-a9c7-487c-93cf-6f44f00818a0\") " pod="kube-system/coredns-674b8bbfcf-jlkth" Sep 13 00:52:43.661767 kubelet[2459]: I0913 00:52:43.661609 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0842bc43-2228-4fc2-95c2-c02de91ded9c-tigera-ca-bundle\") pod \"calico-kube-controllers-58449bd9c9-c5jhp\" (UID: \"0842bc43-2228-4fc2-95c2-c02de91ded9c\") " pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" Sep 13 00:52:43.661767 kubelet[2459]: I0913 00:52:43.661657 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-ca-bundle\") pod \"whisker-5f7b4c9d88-g4s6v\" (UID: \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\") " pod="calico-system/whisker-5f7b4c9d88-g4s6v" Sep 13 00:52:43.661767 kubelet[2459]: I0913 00:52:43.661681 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k6r4z\" (UniqueName: \"kubernetes.io/projected/c9bd58aa-61b3-41ee-9363-ac0a9031904f-kube-api-access-k6r4z\") pod \"whisker-5f7b4c9d88-g4s6v\" (UID: \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\") " pod="calico-system/whisker-5f7b4c9d88-g4s6v" Sep 13 00:52:43.661767 kubelet[2459]: I0913 00:52:43.661708 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t5fr2\" (UniqueName: \"kubernetes.io/projected/3c6f78d0-da77-44c3-b47d-2022e353b3d8-kube-api-access-t5fr2\") pod \"coredns-674b8bbfcf-zslpf\" (UID: \"3c6f78d0-da77-44c3-b47d-2022e353b3d8\") " pod="kube-system/coredns-674b8bbfcf-zslpf" Sep 13 00:52:43.662287 kubelet[2459]: I0913 00:52:43.661733 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c4ac56c6-a9c7-487c-93cf-6f44f00818a0-config-volume\") pod \"coredns-674b8bbfcf-jlkth\" (UID: \"c4ac56c6-a9c7-487c-93cf-6f44f00818a0\") " pod="kube-system/coredns-674b8bbfcf-jlkth" Sep 13 00:52:43.662287 kubelet[2459]: I0913 00:52:43.661760 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wxr8g\" (UniqueName: \"kubernetes.io/projected/0842bc43-2228-4fc2-95c2-c02de91ded9c-kube-api-access-wxr8g\") pod \"calico-kube-controllers-58449bd9c9-c5jhp\" (UID: \"0842bc43-2228-4fc2-95c2-c02de91ded9c\") " pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" Sep 13 00:52:43.662287 kubelet[2459]: I0913 00:52:43.661782 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-backend-key-pair\") pod \"whisker-5f7b4c9d88-g4s6v\" (UID: \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\") " pod="calico-system/whisker-5f7b4c9d88-g4s6v" Sep 13 00:52:43.662287 kubelet[2459]: I0913 00:52:43.661808 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3c6f78d0-da77-44c3-b47d-2022e353b3d8-config-volume\") pod \"coredns-674b8bbfcf-zslpf\" (UID: \"3c6f78d0-da77-44c3-b47d-2022e353b3d8\") " pod="kube-system/coredns-674b8bbfcf-zslpf" Sep 13 00:52:43.669471 env[1460]: time="2025-09-13T00:52:43.668578631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p988w,Uid:139bb3f6-e4bb-4467-b6cc-4bdf44d43b16,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:43.675071 systemd[1]: Created slice kubepods-burstable-podc4ac56c6_a9c7_487c_93cf_6f44f00818a0.slice. Sep 13 00:52:43.687312 systemd[1]: Created slice kubepods-besteffort-podc9bd58aa_61b3_41ee_9363_ac0a9031904f.slice. Sep 13 00:52:43.709739 systemd[1]: Created slice kubepods-besteffort-pod0842bc43_2228_4fc2_95c2_c02de91ded9c.slice. Sep 13 00:52:43.724327 systemd[1]: Created slice kubepods-besteffort-pod92e5d815_a906_4584_bb94_c0beb8a1ea80.slice. Sep 13 00:52:43.727818 systemd[1]: Created slice kubepods-besteffort-podc2147640_97b0_4945_9ff9_730c9fd768d0.slice. Sep 13 00:52:43.739689 systemd[1]: Created slice kubepods-besteffort-podc58b5451_a522_4560_86cc_ec147932482a.slice. Sep 13 00:52:43.763198 kubelet[2459]: I0913 00:52:43.763163 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c58b5451-a522-4560-86cc-ec147932482a-calico-apiserver-certs\") pod \"calico-apiserver-5d7c85d74f-wbxlq\" (UID: \"c58b5451-a522-4560-86cc-ec147932482a\") " pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" Sep 13 00:52:43.765924 kubelet[2459]: I0913 00:52:43.765889 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/92e5d815-a906-4584-bb94-c0beb8a1ea80-config\") pod \"goldmane-54d579b49d-jb8v5\" (UID: \"92e5d815-a906-4584-bb94-c0beb8a1ea80\") " pod="calico-system/goldmane-54d579b49d-jb8v5" Sep 13 00:52:43.766036 kubelet[2459]: I0913 00:52:43.765964 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/92e5d815-a906-4584-bb94-c0beb8a1ea80-goldmane-ca-bundle\") pod \"goldmane-54d579b49d-jb8v5\" (UID: \"92e5d815-a906-4584-bb94-c0beb8a1ea80\") " pod="calico-system/goldmane-54d579b49d-jb8v5" Sep 13 00:52:43.766036 kubelet[2459]: I0913 00:52:43.765992 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/92e5d815-a906-4584-bb94-c0beb8a1ea80-goldmane-key-pair\") pod \"goldmane-54d579b49d-jb8v5\" (UID: \"92e5d815-a906-4584-bb94-c0beb8a1ea80\") " pod="calico-system/goldmane-54d579b49d-jb8v5" Sep 13 00:52:43.769104 kubelet[2459]: I0913 00:52:43.769079 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c2147640-97b0-4945-9ff9-730c9fd768d0-calico-apiserver-certs\") pod \"calico-apiserver-5d7c85d74f-g5x2r\" (UID: \"c2147640-97b0-4945-9ff9-730c9fd768d0\") " pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" Sep 13 00:52:43.777656 kubelet[2459]: I0913 00:52:43.774688 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sn4r7\" (UniqueName: \"kubernetes.io/projected/c58b5451-a522-4560-86cc-ec147932482a-kube-api-access-sn4r7\") pod \"calico-apiserver-5d7c85d74f-wbxlq\" (UID: \"c58b5451-a522-4560-86cc-ec147932482a\") " pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" Sep 13 00:52:43.777656 kubelet[2459]: I0913 00:52:43.774737 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-txh4k\" (UniqueName: \"kubernetes.io/projected/92e5d815-a906-4584-bb94-c0beb8a1ea80-kube-api-access-txh4k\") pod \"goldmane-54d579b49d-jb8v5\" (UID: \"92e5d815-a906-4584-bb94-c0beb8a1ea80\") " pod="calico-system/goldmane-54d579b49d-jb8v5" Sep 13 00:52:43.777656 kubelet[2459]: I0913 00:52:43.774806 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2scv\" (UniqueName: \"kubernetes.io/projected/c2147640-97b0-4945-9ff9-730c9fd768d0-kube-api-access-j2scv\") pod \"calico-apiserver-5d7c85d74f-g5x2r\" (UID: \"c2147640-97b0-4945-9ff9-730c9fd768d0\") " pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" Sep 13 00:52:43.830061 env[1460]: time="2025-09-13T00:52:43.829990150Z" level=error msg="Failed to destroy network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:43.830364 env[1460]: time="2025-09-13T00:52:43.830333651Z" level=error msg="encountered an error cleaning up failed sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:43.830438 env[1460]: time="2025-09-13T00:52:43.830390551Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p988w,Uid:139bb3f6-e4bb-4467-b6cc-4bdf44d43b16,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:43.830643 kubelet[2459]: E0913 00:52:43.830592 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:43.830736 kubelet[2459]: E0913 00:52:43.830675 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:43.830736 kubelet[2459]: E0913 00:52:43.830703 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p988w" Sep 13 00:52:43.831500 kubelet[2459]: E0913 00:52:43.830784 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-p988w_calico-system(139bb3f6-e4bb-4467-b6cc-4bdf44d43b16)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-p988w_calico-system(139bb3f6-e4bb-4467-b6cc-4bdf44d43b16)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:43.948200 env[1460]: time="2025-09-13T00:52:43.947016653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-zslpf,Uid:3c6f78d0-da77-44c3-b47d-2022e353b3d8,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:43.992705 env[1460]: time="2025-09-13T00:52:43.992658072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5f7b4c9d88-g4s6v,Uid:c9bd58aa-61b3-41ee-9363-ac0a9031904f,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:43.993249 env[1460]: time="2025-09-13T00:52:43.993214773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-jlkth,Uid:c4ac56c6-a9c7-487c-93cf-6f44f00818a0,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:44.017321 env[1460]: time="2025-09-13T00:52:44.017277335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58449bd9c9-c5jhp,Uid:0842bc43-2228-4fc2-95c2-c02de91ded9c,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:44.026114 env[1460]: time="2025-09-13T00:52:44.026067357Z" level=error msg="Failed to destroy network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.026433 env[1460]: time="2025-09-13T00:52:44.026395358Z" level=error msg="encountered an error cleaning up failed sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.026512 env[1460]: time="2025-09-13T00:52:44.026463958Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-zslpf,Uid:3c6f78d0-da77-44c3-b47d-2022e353b3d8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.026780 kubelet[2459]: E0913 00:52:44.026746 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.026868 kubelet[2459]: E0913 00:52:44.026805 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-zslpf" Sep 13 00:52:44.026868 kubelet[2459]: E0913 00:52:44.026836 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-zslpf" Sep 13 00:52:44.026948 kubelet[2459]: E0913 00:52:44.026901 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-zslpf_kube-system(3c6f78d0-da77-44c3-b47d-2022e353b3d8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-zslpf_kube-system(3c6f78d0-da77-44c3-b47d-2022e353b3d8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-zslpf" podUID="3c6f78d0-da77-44c3-b47d-2022e353b3d8" Sep 13 00:52:44.034567 kubelet[2459]: I0913 00:52:44.034541 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:52:44.035329 env[1460]: time="2025-09-13T00:52:44.035279381Z" level=info msg="StopPodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\"" Sep 13 00:52:44.037347 kubelet[2459]: I0913 00:52:44.037325 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:52:44.037918 env[1460]: time="2025-09-13T00:52:44.037881887Z" level=info msg="StopPodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\"" Sep 13 00:52:44.048469 env[1460]: time="2025-09-13T00:52:44.048430814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-g5x2r,Uid:c2147640-97b0-4945-9ff9-730c9fd768d0,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:52:44.048985 env[1460]: time="2025-09-13T00:52:44.048953615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-wbxlq,Uid:c58b5451-a522-4560-86cc-ec147932482a,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:52:44.049366 env[1460]: time="2025-09-13T00:52:44.049340716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-jb8v5,Uid:92e5d815-a906-4584-bb94-c0beb8a1ea80,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:44.049941 env[1460]: time="2025-09-13T00:52:44.049919618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:52:44.121285 env[1460]: time="2025-09-13T00:52:44.121224999Z" level=error msg="StopPodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" failed" error="failed to destroy network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.121766 kubelet[2459]: E0913 00:52:44.121497 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:52:44.121766 kubelet[2459]: E0913 00:52:44.121573 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633"} Sep 13 00:52:44.121766 kubelet[2459]: E0913 00:52:44.121682 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3c6f78d0-da77-44c3-b47d-2022e353b3d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:44.121766 kubelet[2459]: E0913 00:52:44.121718 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3c6f78d0-da77-44c3-b47d-2022e353b3d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-zslpf" podUID="3c6f78d0-da77-44c3-b47d-2022e353b3d8" Sep 13 00:52:44.152867 env[1460]: time="2025-09-13T00:52:44.152788779Z" level=error msg="StopPodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" failed" error="failed to destroy network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.153097 kubelet[2459]: E0913 00:52:44.153054 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:52:44.153208 kubelet[2459]: E0913 00:52:44.153116 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7"} Sep 13 00:52:44.153208 kubelet[2459]: E0913 00:52:44.153169 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:44.153328 kubelet[2459]: E0913 00:52:44.153211 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p988w" podUID="139bb3f6-e4bb-4467-b6cc-4bdf44d43b16" Sep 13 00:52:44.204081 env[1460]: time="2025-09-13T00:52:44.202889607Z" level=error msg="Failed to destroy network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.204081 env[1460]: time="2025-09-13T00:52:44.203437808Z" level=error msg="encountered an error cleaning up failed sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.204081 env[1460]: time="2025-09-13T00:52:44.203586109Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5f7b4c9d88-g4s6v,Uid:c9bd58aa-61b3-41ee-9363-ac0a9031904f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.204338 kubelet[2459]: E0913 00:52:44.203916 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.204338 kubelet[2459]: E0913 00:52:44.203984 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5f7b4c9d88-g4s6v" Sep 13 00:52:44.204338 kubelet[2459]: E0913 00:52:44.204015 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5f7b4c9d88-g4s6v" Sep 13 00:52:44.204462 kubelet[2459]: E0913 00:52:44.204072 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-5f7b4c9d88-g4s6v_calico-system(c9bd58aa-61b3-41ee-9363-ac0a9031904f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-5f7b4c9d88-g4s6v_calico-system(c9bd58aa-61b3-41ee-9363-ac0a9031904f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5f7b4c9d88-g4s6v" podUID="c9bd58aa-61b3-41ee-9363-ac0a9031904f" Sep 13 00:52:44.300980 env[1460]: time="2025-09-13T00:52:44.300893956Z" level=error msg="Failed to destroy network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.301792 env[1460]: time="2025-09-13T00:52:44.301736958Z" level=error msg="encountered an error cleaning up failed sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.301882 env[1460]: time="2025-09-13T00:52:44.301818958Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-jlkth,Uid:c4ac56c6-a9c7-487c-93cf-6f44f00818a0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.302090 kubelet[2459]: E0913 00:52:44.302056 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.302170 kubelet[2459]: E0913 00:52:44.302117 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-jlkth" Sep 13 00:52:44.302212 kubelet[2459]: E0913 00:52:44.302166 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-jlkth" Sep 13 00:52:44.302259 kubelet[2459]: E0913 00:52:44.302231 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-jlkth_kube-system(c4ac56c6-a9c7-487c-93cf-6f44f00818a0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-jlkth_kube-system(c4ac56c6-a9c7-487c-93cf-6f44f00818a0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-jlkth" podUID="c4ac56c6-a9c7-487c-93cf-6f44f00818a0" Sep 13 00:52:44.313877 env[1460]: time="2025-09-13T00:52:44.313824389Z" level=error msg="Failed to destroy network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.314388 env[1460]: time="2025-09-13T00:52:44.314350790Z" level=error msg="encountered an error cleaning up failed sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.314557 env[1460]: time="2025-09-13T00:52:44.314522191Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58449bd9c9-c5jhp,Uid:0842bc43-2228-4fc2-95c2-c02de91ded9c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.314923 kubelet[2459]: E0913 00:52:44.314888 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.315017 kubelet[2459]: E0913 00:52:44.314951 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" Sep 13 00:52:44.315062 kubelet[2459]: E0913 00:52:44.314982 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" Sep 13 00:52:44.315104 kubelet[2459]: E0913 00:52:44.315079 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-58449bd9c9-c5jhp_calico-system(0842bc43-2228-4fc2-95c2-c02de91ded9c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-58449bd9c9-c5jhp_calico-system(0842bc43-2228-4fc2-95c2-c02de91ded9c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" podUID="0842bc43-2228-4fc2-95c2-c02de91ded9c" Sep 13 00:52:44.333461 env[1460]: time="2025-09-13T00:52:44.333392539Z" level=error msg="Failed to destroy network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.333835 env[1460]: time="2025-09-13T00:52:44.333794140Z" level=error msg="encountered an error cleaning up failed sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.333918 env[1460]: time="2025-09-13T00:52:44.333861840Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-wbxlq,Uid:c58b5451-a522-4560-86cc-ec147932482a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.334215 kubelet[2459]: E0913 00:52:44.334153 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.334310 kubelet[2459]: E0913 00:52:44.334219 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" Sep 13 00:52:44.334310 kubelet[2459]: E0913 00:52:44.334245 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" Sep 13 00:52:44.334384 kubelet[2459]: E0913 00:52:44.334307 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5d7c85d74f-wbxlq_calico-apiserver(c58b5451-a522-4560-86cc-ec147932482a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5d7c85d74f-wbxlq_calico-apiserver(c58b5451-a522-4560-86cc-ec147932482a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" podUID="c58b5451-a522-4560-86cc-ec147932482a" Sep 13 00:52:44.355696 env[1460]: time="2025-09-13T00:52:44.355646595Z" level=error msg="Failed to destroy network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.355949 env[1460]: time="2025-09-13T00:52:44.355918996Z" level=error msg="Failed to destroy network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.356201 env[1460]: time="2025-09-13T00:52:44.356170797Z" level=error msg="encountered an error cleaning up failed sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.356261 env[1460]: time="2025-09-13T00:52:44.356233997Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-jb8v5,Uid:92e5d815-a906-4584-bb94-c0beb8a1ea80,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.357069 kubelet[2459]: E0913 00:52:44.356466 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.357069 kubelet[2459]: E0913 00:52:44.356529 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-jb8v5" Sep 13 00:52:44.357069 kubelet[2459]: E0913 00:52:44.356560 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-jb8v5" Sep 13 00:52:44.357237 env[1460]: time="2025-09-13T00:52:44.356589298Z" level=error msg="encountered an error cleaning up failed sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.357237 env[1460]: time="2025-09-13T00:52:44.356675798Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-g5x2r,Uid:c2147640-97b0-4945-9ff9-730c9fd768d0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.357340 kubelet[2459]: E0913 00:52:44.356616 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-54d579b49d-jb8v5_calico-system(92e5d815-a906-4584-bb94-c0beb8a1ea80)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-54d579b49d-jb8v5_calico-system(92e5d815-a906-4584-bb94-c0beb8a1ea80)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-jb8v5" podUID="92e5d815-a906-4584-bb94-c0beb8a1ea80" Sep 13 00:52:44.357340 kubelet[2459]: E0913 00:52:44.356912 2459 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:44.357340 kubelet[2459]: E0913 00:52:44.356946 2459 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" Sep 13 00:52:44.357476 kubelet[2459]: E0913 00:52:44.356968 2459 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" Sep 13 00:52:44.357476 kubelet[2459]: E0913 00:52:44.357011 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5d7c85d74f-g5x2r_calico-apiserver(c2147640-97b0-4945-9ff9-730c9fd768d0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5d7c85d74f-g5x2r_calico-apiserver(c2147640-97b0-4945-9ff9-730c9fd768d0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" podUID="c2147640-97b0-4945-9ff9-730c9fd768d0" Sep 13 00:52:44.710651 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7-shm.mount: Deactivated successfully. Sep 13 00:52:45.046778 kubelet[2459]: I0913 00:52:45.046754 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:52:45.047430 env[1460]: time="2025-09-13T00:52:45.047383652Z" level=info msg="StopPodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\"" Sep 13 00:52:45.049429 kubelet[2459]: I0913 00:52:45.049398 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:52:45.050044 env[1460]: time="2025-09-13T00:52:45.050007759Z" level=info msg="StopPodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\"" Sep 13 00:52:45.052907 kubelet[2459]: I0913 00:52:45.052886 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:52:45.054375 env[1460]: time="2025-09-13T00:52:45.053484967Z" level=info msg="StopPodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\"" Sep 13 00:52:45.057907 kubelet[2459]: I0913 00:52:45.057405 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:52:45.058415 env[1460]: time="2025-09-13T00:52:45.058022179Z" level=info msg="StopPodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\"" Sep 13 00:52:45.063238 kubelet[2459]: I0913 00:52:45.062765 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:52:45.063713 env[1460]: time="2025-09-13T00:52:45.063686593Z" level=info msg="StopPodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\"" Sep 13 00:52:45.066689 kubelet[2459]: I0913 00:52:45.066668 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:52:45.067346 env[1460]: time="2025-09-13T00:52:45.067307902Z" level=info msg="StopPodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\"" Sep 13 00:52:45.102612 env[1460]: time="2025-09-13T00:52:45.102551490Z" level=error msg="StopPodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" failed" error="failed to destroy network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:45.103503 kubelet[2459]: E0913 00:52:45.103340 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:52:45.103503 kubelet[2459]: E0913 00:52:45.103398 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc"} Sep 13 00:52:45.103503 kubelet[2459]: E0913 00:52:45.103439 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0842bc43-2228-4fc2-95c2-c02de91ded9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:45.103503 kubelet[2459]: E0913 00:52:45.103471 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0842bc43-2228-4fc2-95c2-c02de91ded9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" podUID="0842bc43-2228-4fc2-95c2-c02de91ded9c" Sep 13 00:52:45.118510 env[1460]: time="2025-09-13T00:52:45.118447329Z" level=error msg="StopPodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" failed" error="failed to destroy network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:45.118812 kubelet[2459]: E0913 00:52:45.118756 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:52:45.118911 kubelet[2459]: E0913 00:52:45.118831 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c"} Sep 13 00:52:45.118911 kubelet[2459]: E0913 00:52:45.118884 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"92e5d815-a906-4584-bb94-c0beb8a1ea80\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:45.119041 kubelet[2459]: E0913 00:52:45.118916 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"92e5d815-a906-4584-bb94-c0beb8a1ea80\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-jb8v5" podUID="92e5d815-a906-4584-bb94-c0beb8a1ea80" Sep 13 00:52:45.153192 env[1460]: time="2025-09-13T00:52:45.153131016Z" level=error msg="StopPodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" failed" error="failed to destroy network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:45.153693 kubelet[2459]: E0913 00:52:45.153633 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:52:45.153789 kubelet[2459]: E0913 00:52:45.153715 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459"} Sep 13 00:52:45.153789 kubelet[2459]: E0913 00:52:45.153764 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c2147640-97b0-4945-9ff9-730c9fd768d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:45.153931 kubelet[2459]: E0913 00:52:45.153806 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c2147640-97b0-4945-9ff9-730c9fd768d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" podUID="c2147640-97b0-4945-9ff9-730c9fd768d0" Sep 13 00:52:45.166565 env[1460]: time="2025-09-13T00:52:45.166501349Z" level=error msg="StopPodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" failed" error="failed to destroy network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:45.166823 kubelet[2459]: E0913 00:52:45.166790 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:52:45.166927 kubelet[2459]: E0913 00:52:45.166840 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd"} Sep 13 00:52:45.166927 kubelet[2459]: E0913 00:52:45.166880 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c58b5451-a522-4560-86cc-ec147932482a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:45.166927 kubelet[2459]: E0913 00:52:45.166914 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c58b5451-a522-4560-86cc-ec147932482a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" podUID="c58b5451-a522-4560-86cc-ec147932482a" Sep 13 00:52:45.168725 env[1460]: time="2025-09-13T00:52:45.168678954Z" level=error msg="StopPodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" failed" error="failed to destroy network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:45.169002 kubelet[2459]: E0913 00:52:45.168970 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:52:45.169079 kubelet[2459]: E0913 00:52:45.169003 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c"} Sep 13 00:52:45.169079 kubelet[2459]: E0913 00:52:45.169035 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4ac56c6-a9c7-487c-93cf-6f44f00818a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:45.169079 kubelet[2459]: E0913 00:52:45.169063 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4ac56c6-a9c7-487c-93cf-6f44f00818a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-jlkth" podUID="c4ac56c6-a9c7-487c-93cf-6f44f00818a0" Sep 13 00:52:45.173679 env[1460]: time="2025-09-13T00:52:45.173619267Z" level=error msg="StopPodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" failed" error="failed to destroy network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:45.173816 kubelet[2459]: E0913 00:52:45.173788 2459 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:52:45.173884 kubelet[2459]: E0913 00:52:45.173822 2459 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec"} Sep 13 00:52:45.173884 kubelet[2459]: E0913 00:52:45.173860 2459 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:45.174007 kubelet[2459]: E0913 00:52:45.173889 2459 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5f7b4c9d88-g4s6v" podUID="c9bd58aa-61b3-41ee-9363-ac0a9031904f" Sep 13 00:52:53.153368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2520448757.mount: Deactivated successfully. Sep 13 00:52:53.191458 env[1460]: time="2025-09-13T00:52:53.191409037Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.196366 env[1460]: time="2025-09-13T00:52:53.196321848Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.199647 env[1460]: time="2025-09-13T00:52:53.199604555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.202690 env[1460]: time="2025-09-13T00:52:53.202660262Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.203046 env[1460]: time="2025-09-13T00:52:53.203019462Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:52:53.225216 env[1460]: time="2025-09-13T00:52:53.225178510Z" level=info msg="CreateContainer within sandbox \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:52:53.261348 env[1460]: time="2025-09-13T00:52:53.261302488Z" level=info msg="CreateContainer within sandbox \"1a9f52de679985edc75e95bbfcfced804e8bb051f321e1ed3774267adb8e015e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c\"" Sep 13 00:52:53.261838 env[1460]: time="2025-09-13T00:52:53.261814189Z" level=info msg="StartContainer for \"2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c\"" Sep 13 00:52:53.281925 systemd[1]: Started cri-containerd-2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c.scope. Sep 13 00:52:53.306091 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:52:53.306230 kernel: audit: type=1400 audit(1757724773.300:927): avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f1bb81c9098 items=0 ppid=2949 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.343020 env[1460]: time="2025-09-13T00:52:53.342973463Z" level=info msg="StartContainer for \"2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c\" returns successfully" Sep 13 00:52:53.345460 kernel: audit: type=1300 audit(1757724773.300:927): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f1bb81c9098 items=0 ppid=2949 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333762643336396366626330313534316664333530653839656661 Sep 13 00:52:53.369666 kernel: audit: type=1327 audit(1757724773.300:927): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333762643336396366626330313534316664333530653839656661 Sep 13 00:52:53.386823 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.416512 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.416646 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.416679 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.446760 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.463666 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.463830 kernel: audit: type=1400 audit(1757724773.300:928): avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit: BPF prog-id=134 op=LOAD Sep 13 00:52:53.300000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002efec8 items=0 ppid=2949 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333762643336396366626330313534316664333530653839656661 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit: BPF prog-id=135 op=LOAD Sep 13 00:52:53.300000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002eff18 items=0 ppid=2949 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333762643336396366626330313534316664333530653839656661 Sep 13 00:52:53.300000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:52:53.300000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.300000 audit: BPF prog-id=136 op=LOAD Sep 13 00:52:53.300000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002effa8 items=0 ppid=2949 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333762643336396366626330313534316664333530653839656661 Sep 13 00:52:53.859345 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:52:53.859518 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:52:53.975520 env[1460]: time="2025-09-13T00:52:53.975473924Z" level=info msg="StopPodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\"" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.056 [INFO][3636] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.056 [INFO][3636] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" iface="eth0" netns="/var/run/netns/cni-a596f156-c7f5-1549-d898-46704247e9d4" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.057 [INFO][3636] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" iface="eth0" netns="/var/run/netns/cni-a596f156-c7f5-1549-d898-46704247e9d4" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.057 [INFO][3636] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" iface="eth0" netns="/var/run/netns/cni-a596f156-c7f5-1549-d898-46704247e9d4" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.057 [INFO][3636] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.057 [INFO][3636] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.126 [INFO][3644] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.127 [INFO][3644] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.127 [INFO][3644] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.148 [WARNING][3644] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.148 [INFO][3644] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.156 [INFO][3644] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:54.169457 env[1460]: 2025-09-13 00:52:54.167 [INFO][3636] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:52:54.173010 systemd[1]: run-netns-cni\x2da596f156\x2dc7f5\x2d1549\x2dd898\x2d46704247e9d4.mount: Deactivated successfully. Sep 13 00:52:54.174380 env[1460]: time="2025-09-13T00:52:54.174337145Z" level=info msg="TearDown network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" successfully" Sep 13 00:52:54.174380 env[1460]: time="2025-09-13T00:52:54.174372345Z" level=info msg="StopPodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" returns successfully" Sep 13 00:52:54.235393 kubelet[2459]: I0913 00:52:54.235349 2459 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-ca-bundle\") pod \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\" (UID: \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\") " Sep 13 00:52:54.235855 kubelet[2459]: I0913 00:52:54.235404 2459 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-k6r4z\" (UniqueName: \"kubernetes.io/projected/c9bd58aa-61b3-41ee-9363-ac0a9031904f-kube-api-access-k6r4z\") pod \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\" (UID: \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\") " Sep 13 00:52:54.235855 kubelet[2459]: I0913 00:52:54.235437 2459 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-backend-key-pair\") pod \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\" (UID: \"c9bd58aa-61b3-41ee-9363-ac0a9031904f\") " Sep 13 00:52:54.236201 kubelet[2459]: I0913 00:52:54.236165 2459 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "c9bd58aa-61b3-41ee-9363-ac0a9031904f" (UID: "c9bd58aa-61b3-41ee-9363-ac0a9031904f"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Sep 13 00:52:54.241807 kubelet[2459]: I0913 00:52:54.241720 2459 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "c9bd58aa-61b3-41ee-9363-ac0a9031904f" (UID: "c9bd58aa-61b3-41ee-9363-ac0a9031904f"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:52:54.244720 kubelet[2459]: I0913 00:52:54.243021 2459 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c9bd58aa-61b3-41ee-9363-ac0a9031904f-kube-api-access-k6r4z" (OuterVolumeSpecName: "kube-api-access-k6r4z") pod "c9bd58aa-61b3-41ee-9363-ac0a9031904f" (UID: "c9bd58aa-61b3-41ee-9363-ac0a9031904f"). InnerVolumeSpecName "kube-api-access-k6r4z". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:52:54.245979 systemd[1]: var-lib-kubelet-pods-c9bd58aa\x2d61b3\x2d41ee\x2d9363\x2dac0a9031904f-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 13 00:52:54.250993 systemd[1]: var-lib-kubelet-pods-c9bd58aa\x2d61b3\x2d41ee\x2d9363\x2dac0a9031904f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dk6r4z.mount: Deactivated successfully. Sep 13 00:52:54.336619 kubelet[2459]: I0913 00:52:54.336581 2459 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-ca-bundle\") on node \"ci-3510.3.8-n-99e6272c46\" DevicePath \"\"" Sep 13 00:52:54.336619 kubelet[2459]: I0913 00:52:54.336620 2459 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-k6r4z\" (UniqueName: \"kubernetes.io/projected/c9bd58aa-61b3-41ee-9363-ac0a9031904f-kube-api-access-k6r4z\") on node \"ci-3510.3.8-n-99e6272c46\" DevicePath \"\"" Sep 13 00:52:54.336859 kubelet[2459]: I0913 00:52:54.336646 2459 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/c9bd58aa-61b3-41ee-9363-ac0a9031904f-whisker-backend-key-pair\") on node \"ci-3510.3.8-n-99e6272c46\" DevicePath \"\"" Sep 13 00:52:54.949263 systemd[1]: Removed slice kubepods-besteffort-podc9bd58aa_61b3_41ee_9363_ac0a9031904f.slice. Sep 13 00:52:55.118936 kubelet[2459]: I0913 00:52:55.118814 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-svv2x" podStartSLOduration=2.764350464 podStartE2EDuration="26.118796737s" podCreationTimestamp="2025-09-13 00:52:29 +0000 UTC" firstStartedPulling="2025-09-13 00:52:29.849524692 +0000 UTC m=+21.017541485" lastFinishedPulling="2025-09-13 00:52:53.203970965 +0000 UTC m=+44.371987758" observedRunningTime="2025-09-13 00:52:54.119132528 +0000 UTC m=+45.287149321" watchObservedRunningTime="2025-09-13 00:52:55.118796737 +0000 UTC m=+46.286813530" Sep 13 00:52:55.153743 systemd[1]: run-containerd-runc-k8s.io-2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c-runc.AH6tu9.mount: Deactivated successfully. Sep 13 00:52:55.181035 systemd[1]: Created slice kubepods-besteffort-pod973b1c15_c24c_4915_a662_34d9c3d59739.slice. Sep 13 00:52:55.244805 kubelet[2459]: I0913 00:52:55.244693 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlt5c\" (UniqueName: \"kubernetes.io/projected/973b1c15-c24c-4915-a662-34d9c3d59739-kube-api-access-tlt5c\") pod \"whisker-57f757f647-cqnt2\" (UID: \"973b1c15-c24c-4915-a662-34d9c3d59739\") " pod="calico-system/whisker-57f757f647-cqnt2" Sep 13 00:52:55.244805 kubelet[2459]: I0913 00:52:55.244733 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/973b1c15-c24c-4915-a662-34d9c3d59739-whisker-backend-key-pair\") pod \"whisker-57f757f647-cqnt2\" (UID: \"973b1c15-c24c-4915-a662-34d9c3d59739\") " pod="calico-system/whisker-57f757f647-cqnt2" Sep 13 00:52:55.244805 kubelet[2459]: I0913 00:52:55.244758 2459 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/973b1c15-c24c-4915-a662-34d9c3d59739-whisker-ca-bundle\") pod \"whisker-57f757f647-cqnt2\" (UID: \"973b1c15-c24c-4915-a662-34d9c3d59739\") " pod="calico-system/whisker-57f757f647-cqnt2" Sep 13 00:52:55.427000 audit[3760]: AVC avc: denied { write } for pid=3760 comm="tee" name="fd" dev="proc" ino=29364 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.427000 audit[3760]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf20297bb a2=241 a3=1b6 items=1 ppid=3720 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.427000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:52:55.427000 audit: PATH item=0 name="/dev/fd/63" inode=30425 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.440000 audit[3763]: AVC avc: denied { write } for pid=3763 comm="tee" name="fd" dev="proc" ino=29373 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.440000 audit[3763]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd965b7cb a2=241 a3=1b6 items=1 ppid=3719 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.440000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:52:55.440000 audit: PATH item=0 name="/dev/fd/63" inode=29353 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.440000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.445000 audit[3765]: AVC avc: denied { write } for pid=3765 comm="tee" name="fd" dev="proc" ino=30433 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.446000 audit[3768]: AVC avc: denied { write } for pid=3768 comm="tee" name="fd" dev="proc" ino=30436 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.446000 audit[3774]: AVC avc: denied { write } for pid=3774 comm="tee" name="fd" dev="proc" ino=29380 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.446000 audit[3774]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5e43c7cb a2=241 a3=1b6 items=1 ppid=3715 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.446000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:52:55.446000 audit: PATH item=0 name="/dev/fd/63" inode=29368 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.446000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.445000 audit[3765]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee1b547cc a2=241 a3=1b6 items=1 ppid=3713 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.445000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:52:55.445000 audit: PATH item=0 name="/dev/fd/63" inode=30429 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.446000 audit[3768]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd25b247cd a2=241 a3=1b6 items=1 ppid=3717 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.446000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:52:55.446000 audit: PATH item=0 name="/dev/fd/63" inode=29358 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.446000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.450000 audit[3777]: AVC avc: denied { write } for pid=3777 comm="tee" name="fd" dev="proc" ino=29384 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.450000 audit[3777]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd649167bc a2=241 a3=1b6 items=1 ppid=3726 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.450000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:52:55.450000 audit: PATH item=0 name="/dev/fd/63" inode=29371 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.450000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.462000 audit[3784]: AVC avc: denied { write } for pid=3784 comm="tee" name="fd" dev="proc" ino=29388 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:55.462000 audit[3784]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa9b097cb a2=241 a3=1b6 items=1 ppid=3732 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.462000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:52:55.462000 audit: PATH item=0 name="/dev/fd/63" inode=29377 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:55.462000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:55.485691 env[1460]: time="2025-09-13T00:52:55.485639199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-57f757f647-cqnt2,Uid:973b1c15-c24c-4915-a662-34d9c3d59739,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:55.690107 systemd-networkd[1596]: cali7f6a2346793: Link UP Sep 13 00:52:55.698691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:52:55.707400 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f6a2346793: link becomes ready Sep 13 00:52:55.713085 systemd-networkd[1596]: cali7f6a2346793: Gained carrier Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.563 [INFO][3789] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.575 [INFO][3789] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0 whisker-57f757f647- calico-system 973b1c15-c24c-4915-a662-34d9c3d59739 908 0 2025-09-13 00:52:55 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:57f757f647 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 whisker-57f757f647-cqnt2 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali7f6a2346793 [] [] }} ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.575 [INFO][3789] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.605 [INFO][3801] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" HandleID="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.606 [INFO][3801] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" HandleID="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-99e6272c46", "pod":"whisker-57f757f647-cqnt2", "timestamp":"2025-09-13 00:52:55.605882749 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.606 [INFO][3801] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.606 [INFO][3801] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.606 [INFO][3801] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.614 [INFO][3801] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.620 [INFO][3801] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.626 [INFO][3801] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.628 [INFO][3801] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.630 [INFO][3801] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.630 [INFO][3801] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.631 [INFO][3801] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.636 [INFO][3801] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.645 [INFO][3801] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.65/26] block=192.168.56.64/26 handle="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.645 [INFO][3801] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.65/26] handle="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.645 [INFO][3801] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:55.731425 env[1460]: 2025-09-13 00:52:55.645 [INFO][3801] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.65/26] IPv6=[] ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" HandleID="k8s-pod-network.f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.732469 env[1460]: 2025-09-13 00:52:55.648 [INFO][3789] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0", GenerateName:"whisker-57f757f647-", Namespace:"calico-system", SelfLink:"", UID:"973b1c15-c24c-4915-a662-34d9c3d59739", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"57f757f647", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"whisker-57f757f647-cqnt2", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.56.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali7f6a2346793", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:55.732469 env[1460]: 2025-09-13 00:52:55.648 [INFO][3789] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.65/32] ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.732469 env[1460]: 2025-09-13 00:52:55.648 [INFO][3789] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7f6a2346793 ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.732469 env[1460]: 2025-09-13 00:52:55.715 [INFO][3789] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.732469 env[1460]: 2025-09-13 00:52:55.715 [INFO][3789] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0", GenerateName:"whisker-57f757f647-", Namespace:"calico-system", SelfLink:"", UID:"973b1c15-c24c-4915-a662-34d9c3d59739", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"57f757f647", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb", Pod:"whisker-57f757f647-cqnt2", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.56.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali7f6a2346793", MAC:"42:56:ee:68:0d:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:55.732469 env[1460]: 2025-09-13 00:52:55.729 [INFO][3789] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb" Namespace="calico-system" Pod="whisker-57f757f647-cqnt2" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--57f757f647--cqnt2-eth0" Sep 13 00:52:55.753082 env[1460]: time="2025-09-13T00:52:55.753011655Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:55.753241 env[1460]: time="2025-09-13T00:52:55.753095755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:55.753241 env[1460]: time="2025-09-13T00:52:55.753123455Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:55.753330 env[1460]: time="2025-09-13T00:52:55.753278155Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb pid=3832 runtime=io.containerd.runc.v2 Sep 13 00:52:55.775599 systemd[1]: Started cri-containerd-f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb.scope. Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit: BPF prog-id=137 op=LOAD Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3832 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633931653236626535636330396162653766653635356539613965 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3832 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633931653236626535636330396162653766653635356539613965 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.809000 audit: BPF prog-id=138 op=LOAD Sep 13 00:52:55.809000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001dfce0 items=0 ppid=3832 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633931653236626535636330396162653766653635356539613965 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit: BPF prog-id=139 op=LOAD Sep 13 00:52:55.810000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001dfd28 items=0 ppid=3832 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633931653236626535636330396162653766653635356539613965 Sep 13 00:52:55.810000 audit: BPF prog-id=139 op=UNLOAD Sep 13 00:52:55.810000 audit: BPF prog-id=138 op=UNLOAD Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:55.810000 audit: BPF prog-id=140 op=LOAD Sep 13 00:52:55.810000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000362138 items=0 ppid=3832 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:55.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633931653236626535636330396162653766653635356539613965 Sep 13 00:52:55.843378 env[1460]: time="2025-09-13T00:52:55.843329642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-57f757f647-cqnt2,Uid:973b1c15-c24c-4915-a662-34d9c3d59739,Namespace:calico-system,Attempt:0,} returns sandbox id \"f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb\"" Sep 13 00:52:55.846688 env[1460]: time="2025-09-13T00:52:55.845758948Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 13 00:52:55.945384 env[1460]: time="2025-09-13T00:52:55.945275454Z" level=info msg="StopPodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\"" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:55.988 [INFO][3876] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:55.988 [INFO][3876] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" iface="eth0" netns="/var/run/netns/cni-66d9868e-8dcf-751a-6744-b5329a877f25" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:55.989 [INFO][3876] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" iface="eth0" netns="/var/run/netns/cni-66d9868e-8dcf-751a-6744-b5329a877f25" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:55.989 [INFO][3876] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" iface="eth0" netns="/var/run/netns/cni-66d9868e-8dcf-751a-6744-b5329a877f25" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:55.989 [INFO][3876] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:55.989 [INFO][3876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.011 [INFO][3883] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.011 [INFO][3883] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.011 [INFO][3883] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.018 [WARNING][3883] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.018 [INFO][3883] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.020 [INFO][3883] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:56.025212 env[1460]: 2025-09-13 00:52:56.023 [INFO][3876] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:52:56.025850 env[1460]: time="2025-09-13T00:52:56.025328720Z" level=info msg="TearDown network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" successfully" Sep 13 00:52:56.025850 env[1460]: time="2025-09-13T00:52:56.025367020Z" level=info msg="StopPodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" returns successfully" Sep 13 00:52:56.026529 env[1460]: time="2025-09-13T00:52:56.026497922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-g5x2r,Uid:c2147640-97b0-4945-9ff9-730c9fd768d0,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:52:56.159599 systemd[1]: run-netns-cni\x2d66d9868e\x2d8dcf\x2d751a\x2d6744\x2db5329a877f25.mount: Deactivated successfully. Sep 13 00:52:56.181425 systemd-networkd[1596]: cali289fe135f2d: Link UP Sep 13 00:52:56.188764 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali289fe135f2d: link becomes ready Sep 13 00:52:56.188940 systemd-networkd[1596]: cali289fe135f2d: Gained carrier Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.081 [INFO][3889] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.095 [INFO][3889] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0 calico-apiserver-5d7c85d74f- calico-apiserver c2147640-97b0-4945-9ff9-730c9fd768d0 916 0 2025-09-13 00:52:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5d7c85d74f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 calico-apiserver-5d7c85d74f-g5x2r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali289fe135f2d [] [] }} ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.095 [INFO][3889] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.125 [INFO][3901] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" HandleID="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.125 [INFO][3901] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" HandleID="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccff0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-99e6272c46", "pod":"calico-apiserver-5d7c85d74f-g5x2r", "timestamp":"2025-09-13 00:52:56.125397624 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.126 [INFO][3901] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.126 [INFO][3901] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.126 [INFO][3901] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.133 [INFO][3901] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.138 [INFO][3901] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.149 [INFO][3901] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.162 [INFO][3901] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.164 [INFO][3901] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.164 [INFO][3901] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.166 [INFO][3901] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9 Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.170 [INFO][3901] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.177 [INFO][3901] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.66/26] block=192.168.56.64/26 handle="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.177 [INFO][3901] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.66/26] handle="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.177 [INFO][3901] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:56.206446 env[1460]: 2025-09-13 00:52:56.178 [INFO][3901] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.66/26] IPv6=[] ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" HandleID="k8s-pod-network.05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.207385 env[1460]: 2025-09-13 00:52:56.179 [INFO][3889] cni-plugin/k8s.go 418: Populated endpoint ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2147640-97b0-4945-9ff9-730c9fd768d0", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"calico-apiserver-5d7c85d74f-g5x2r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali289fe135f2d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:56.207385 env[1460]: 2025-09-13 00:52:56.179 [INFO][3889] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.66/32] ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.207385 env[1460]: 2025-09-13 00:52:56.179 [INFO][3889] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali289fe135f2d ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.207385 env[1460]: 2025-09-13 00:52:56.191 [INFO][3889] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.207385 env[1460]: 2025-09-13 00:52:56.191 [INFO][3889] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2147640-97b0-4945-9ff9-730c9fd768d0", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9", Pod:"calico-apiserver-5d7c85d74f-g5x2r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali289fe135f2d", MAC:"2a:80:35:a0:e5:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:56.207385 env[1460]: 2025-09-13 00:52:56.204 [INFO][3889] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-g5x2r" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:52:56.224044 env[1460]: time="2025-09-13T00:52:56.223960426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:56.224224 env[1460]: time="2025-09-13T00:52:56.224011126Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:56.224224 env[1460]: time="2025-09-13T00:52:56.224030526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:56.224341 env[1460]: time="2025-09-13T00:52:56.224238226Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9 pid=3920 runtime=io.containerd.runc.v2 Sep 13 00:52:56.253808 systemd[1]: run-containerd-runc-k8s.io-05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9-runc.l7Ivuz.mount: Deactivated successfully. Sep 13 00:52:56.257149 systemd[1]: Started cri-containerd-05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9.scope. Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.268000 audit: BPF prog-id=141 op=LOAD Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613039343665326232623165386164666363643134343664623831 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613039343665326232623165386164666363643134343664623831 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.269000 audit: BPF prog-id=142 op=LOAD Sep 13 00:52:56.269000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000279f50 items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613039343665326232623165386164666363643134343664623831 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit: BPF prog-id=143 op=LOAD Sep 13 00:52:56.270000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000279f98 items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613039343665326232623165386164666363643134343664623831 Sep 13 00:52:56.270000 audit: BPF prog-id=143 op=UNLOAD Sep 13 00:52:56.270000 audit: BPF prog-id=142 op=UNLOAD Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:56.270000 audit: BPF prog-id=144 op=LOAD Sep 13 00:52:56.270000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003f03a8 items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:56.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613039343665326232623165386164666363643134343664623831 Sep 13 00:52:56.301859 env[1460]: time="2025-09-13T00:52:56.301819185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-g5x2r,Uid:c2147640-97b0-4945-9ff9-730c9fd768d0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9\"" Sep 13 00:52:56.946558 env[1460]: time="2025-09-13T00:52:56.946509602Z" level=info msg="StopPodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\"" Sep 13 00:52:56.947574 env[1460]: time="2025-09-13T00:52:56.947541704Z" level=info msg="StopPodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\"" Sep 13 00:52:56.949009 kubelet[2459]: I0913 00:52:56.948984 2459 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="c9bd58aa-61b3-41ee-9363-ac0a9031904f" path="/var/lib/kubelet/pods/c9bd58aa-61b3-41ee-9363-ac0a9031904f/volumes" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.044 [INFO][3992] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.045 [INFO][3992] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" iface="eth0" netns="/var/run/netns/cni-caf01921-6ecb-717a-5fe8-0fb97056668d" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.045 [INFO][3992] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" iface="eth0" netns="/var/run/netns/cni-caf01921-6ecb-717a-5fe8-0fb97056668d" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.045 [INFO][3992] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" iface="eth0" netns="/var/run/netns/cni-caf01921-6ecb-717a-5fe8-0fb97056668d" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.045 [INFO][3992] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.045 [INFO][3992] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.104 [INFO][4004] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.107 [INFO][4004] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.107 [INFO][4004] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.116 [WARNING][4004] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.116 [INFO][4004] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.117 [INFO][4004] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:57.120539 env[1460]: 2025-09-13 00:52:57.119 [INFO][3992] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:52:57.121169 env[1460]: time="2025-09-13T00:52:57.120720354Z" level=info msg="TearDown network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" successfully" Sep 13 00:52:57.121169 env[1460]: time="2025-09-13T00:52:57.120755754Z" level=info msg="StopPodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" returns successfully" Sep 13 00:52:57.121434 env[1460]: time="2025-09-13T00:52:57.121358855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-zslpf,Uid:3c6f78d0-da77-44c3-b47d-2022e353b3d8,Namespace:kube-system,Attempt:1,}" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.051 [INFO][3988] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.051 [INFO][3988] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" iface="eth0" netns="/var/run/netns/cni-6ec8ae59-3534-c44d-b56c-fae2e3775d5d" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.051 [INFO][3988] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" iface="eth0" netns="/var/run/netns/cni-6ec8ae59-3534-c44d-b56c-fae2e3775d5d" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.051 [INFO][3988] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" iface="eth0" netns="/var/run/netns/cni-6ec8ae59-3534-c44d-b56c-fae2e3775d5d" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.051 [INFO][3988] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.051 [INFO][3988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.124 [INFO][4009] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.124 [INFO][4009] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.124 [INFO][4009] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.130 [WARNING][4009] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.130 [INFO][4009] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.131 [INFO][4009] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:57.134880 env[1460]: 2025-09-13 00:52:57.132 [INFO][3988] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:52:57.135516 env[1460]: time="2025-09-13T00:52:57.135000482Z" level=info msg="TearDown network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" successfully" Sep 13 00:52:57.135516 env[1460]: time="2025-09-13T00:52:57.135030082Z" level=info msg="StopPodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" returns successfully" Sep 13 00:52:57.137508 env[1460]: time="2025-09-13T00:52:57.137464887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58449bd9c9-c5jhp,Uid:0842bc43-2228-4fc2-95c2-c02de91ded9c,Namespace:calico-system,Attempt:1,}" Sep 13 00:52:57.160995 systemd[1]: run-netns-cni\x2d6ec8ae59\x2d3534\x2dc44d\x2db56c\x2dfae2e3775d5d.mount: Deactivated successfully. Sep 13 00:52:57.161090 systemd[1]: run-netns-cni\x2dcaf01921\x2d6ecb\x2d717a\x2d5fe8\x2d0fb97056668d.mount: Deactivated successfully. Sep 13 00:52:57.328195 systemd-networkd[1596]: cali1bb2b4fec3b: Link UP Sep 13 00:52:57.341847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:52:57.341959 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1bb2b4fec3b: link becomes ready Sep 13 00:52:57.343679 systemd-networkd[1596]: cali1bb2b4fec3b: Gained carrier Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.186 [INFO][4017] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.199 [INFO][4017] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0 coredns-674b8bbfcf- kube-system 3c6f78d0-da77-44c3-b47d-2022e353b3d8 924 0 2025-09-13 00:52:15 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 coredns-674b8bbfcf-zslpf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1bb2b4fec3b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.199 [INFO][4017] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.288 [INFO][4031] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" HandleID="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.289 [INFO][4031] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" HandleID="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c97f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.8-n-99e6272c46", "pod":"coredns-674b8bbfcf-zslpf", "timestamp":"2025-09-13 00:52:57.288811791 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.289 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.289 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.289 [INFO][4031] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.296 [INFO][4031] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.300 [INFO][4031] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.304 [INFO][4031] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.305 [INFO][4031] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.307 [INFO][4031] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.308 [INFO][4031] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.309 [INFO][4031] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5 Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.314 [INFO][4031] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.323 [INFO][4031] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.67/26] block=192.168.56.64/26 handle="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.323 [INFO][4031] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.67/26] handle="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.323 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:57.366340 env[1460]: 2025-09-13 00:52:57.323 [INFO][4031] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.67/26] IPv6=[] ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" HandleID="k8s-pod-network.9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.367247 env[1460]: 2025-09-13 00:52:57.325 [INFO][4017] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"3c6f78d0-da77-44c3-b47d-2022e353b3d8", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"coredns-674b8bbfcf-zslpf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1bb2b4fec3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:57.367247 env[1460]: 2025-09-13 00:52:57.325 [INFO][4017] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.67/32] ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.367247 env[1460]: 2025-09-13 00:52:57.325 [INFO][4017] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1bb2b4fec3b ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.367247 env[1460]: 2025-09-13 00:52:57.343 [INFO][4017] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.367247 env[1460]: 2025-09-13 00:52:57.344 [INFO][4017] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"3c6f78d0-da77-44c3-b47d-2022e353b3d8", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5", Pod:"coredns-674b8bbfcf-zslpf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1bb2b4fec3b", MAC:"ee:f1:d2:19:be:d6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:57.367247 env[1460]: 2025-09-13 00:52:57.364 [INFO][4017] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-zslpf" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:52:57.412574 env[1460]: time="2025-09-13T00:52:57.412484040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:57.412574 env[1460]: time="2025-09-13T00:52:57.412537740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:57.412574 env[1460]: time="2025-09-13T00:52:57.412554040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:57.413022 env[1460]: time="2025-09-13T00:52:57.412971241Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5 pid=4072 runtime=io.containerd.runc.v2 Sep 13 00:52:57.425816 systemd-networkd[1596]: cali7f6a2346793: Gained IPv6LL Sep 13 00:52:57.426087 systemd-networkd[1596]: cali289fe135f2d: Gained IPv6LL Sep 13 00:52:57.450799 systemd-networkd[1596]: cali4a3f7db9dc1: Link UP Sep 13 00:52:57.466649 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a3f7db9dc1: link becomes ready Sep 13 00:52:57.471596 systemd[1]: Started cri-containerd-9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5.scope. Sep 13 00:52:57.483451 systemd-networkd[1596]: cali4a3f7db9dc1: Gained carrier Sep 13 00:52:57.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.511000 audit: BPF prog-id=145 op=LOAD Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4072 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323762373430636632393434323331303530343337666130616338 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4072 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323762373430636632393434323331303530343337666130616338 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.515000 audit: BPF prog-id=146 op=LOAD Sep 13 00:52:57.515000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d4170 items=0 ppid=4072 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323762373430636632393434323331303530343337666130616338 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit: BPF prog-id=147 op=LOAD Sep 13 00:52:57.516000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d41b8 items=0 ppid=4072 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323762373430636632393434323331303530343337666130616338 Sep 13 00:52:57.516000 audit: BPF prog-id=147 op=UNLOAD Sep 13 00:52:57.516000 audit: BPF prog-id=146 op=UNLOAD Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.516000 audit: BPF prog-id=148 op=LOAD Sep 13 00:52:57.516000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d45c8 items=0 ppid=4072 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323762373430636632393434323331303530343337666130616338 Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.269 [INFO][4032] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.280 [INFO][4032] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0 calico-kube-controllers-58449bd9c9- calico-system 0842bc43-2228-4fc2-95c2-c02de91ded9c 925 0 2025-09-13 00:52:29 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:58449bd9c9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 calico-kube-controllers-58449bd9c9-c5jhp eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4a3f7db9dc1 [] [] }} ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.280 [INFO][4032] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.376 [INFO][4049] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" HandleID="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.376 [INFO][4049] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" HandleID="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9c00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-99e6272c46", "pod":"calico-kube-controllers-58449bd9c9-c5jhp", "timestamp":"2025-09-13 00:52:57.376326267 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.377 [INFO][4049] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.377 [INFO][4049] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.377 [INFO][4049] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.398 [INFO][4049] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.402 [INFO][4049] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.407 [INFO][4049] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.408 [INFO][4049] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.414 [INFO][4049] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.414 [INFO][4049] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.422 [INFO][4049] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928 Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.429 [INFO][4049] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.445 [INFO][4049] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.68/26] block=192.168.56.64/26 handle="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.445 [INFO][4049] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.68/26] handle="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.445 [INFO][4049] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:57.521969 env[1460]: 2025-09-13 00:52:57.445 [INFO][4049] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.68/26] IPv6=[] ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" HandleID="k8s-pod-network.ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.523371 env[1460]: 2025-09-13 00:52:57.447 [INFO][4032] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0", GenerateName:"calico-kube-controllers-58449bd9c9-", Namespace:"calico-system", SelfLink:"", UID:"0842bc43-2228-4fc2-95c2-c02de91ded9c", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58449bd9c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"calico-kube-controllers-58449bd9c9-c5jhp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a3f7db9dc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:57.523371 env[1460]: 2025-09-13 00:52:57.447 [INFO][4032] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.68/32] ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.523371 env[1460]: 2025-09-13 00:52:57.448 [INFO][4032] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4a3f7db9dc1 ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.523371 env[1460]: 2025-09-13 00:52:57.488 [INFO][4032] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.523371 env[1460]: 2025-09-13 00:52:57.489 [INFO][4032] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0", GenerateName:"calico-kube-controllers-58449bd9c9-", Namespace:"calico-system", SelfLink:"", UID:"0842bc43-2228-4fc2-95c2-c02de91ded9c", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58449bd9c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928", Pod:"calico-kube-controllers-58449bd9c9-c5jhp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a3f7db9dc1", MAC:"36:74:67:49:5d:3d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:57.523371 env[1460]: 2025-09-13 00:52:57.513 [INFO][4032] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928" Namespace="calico-system" Pod="calico-kube-controllers-58449bd9c9-c5jhp" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:52:57.569575 env[1460]: time="2025-09-13T00:52:57.569502555Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:57.569741 env[1460]: time="2025-09-13T00:52:57.569578255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:57.569741 env[1460]: time="2025-09-13T00:52:57.569606356Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:57.570066 env[1460]: time="2025-09-13T00:52:57.570024056Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928 pid=4116 runtime=io.containerd.runc.v2 Sep 13 00:52:57.586482 env[1460]: time="2025-09-13T00:52:57.586374589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-zslpf,Uid:3c6f78d0-da77-44c3-b47d-2022e353b3d8,Namespace:kube-system,Attempt:1,} returns sandbox id \"9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5\"" Sep 13 00:52:57.594426 env[1460]: time="2025-09-13T00:52:57.594385705Z" level=info msg="CreateContainer within sandbox \"9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:52:57.602790 systemd[1]: Started cri-containerd-ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928.scope. Sep 13 00:52:57.632045 env[1460]: time="2025-09-13T00:52:57.632009081Z" level=info msg="CreateContainer within sandbox \"9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bd3f875ae3d168dd2a63fb1d92dce7fff5be4ba0b13adb6dcb0ffa8f478fe262\"" Sep 13 00:52:57.633878 env[1460]: time="2025-09-13T00:52:57.632734682Z" level=info msg="StartContainer for \"bd3f875ae3d168dd2a63fb1d92dce7fff5be4ba0b13adb6dcb0ffa8f478fe262\"" Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit: BPF prog-id=149 op=LOAD Sep 13 00:52:57.641000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4116 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343430653435306133386363636266306163663062346665613339 Sep 13 00:52:57.641000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.641000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4116 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343430653435306133386363636266306163663062346665613339 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit: BPF prog-id=150 op=LOAD Sep 13 00:52:57.642000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e4670 items=0 ppid=4116 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343430653435306133386363636266306163663062346665613339 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit: BPF prog-id=151 op=LOAD Sep 13 00:52:57.642000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e46b8 items=0 ppid=4116 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343430653435306133386363636266306163663062346665613339 Sep 13 00:52:57.642000 audit: BPF prog-id=151 op=UNLOAD Sep 13 00:52:57.642000 audit: BPF prog-id=150 op=UNLOAD Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.642000 audit: BPF prog-id=152 op=LOAD Sep 13 00:52:57.642000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4ac8 items=0 ppid=4116 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343430653435306133386363636266306163663062346665613339 Sep 13 00:52:57.654004 systemd[1]: Started cri-containerd-bd3f875ae3d168dd2a63fb1d92dce7fff5be4ba0b13adb6dcb0ffa8f478fe262.scope. Sep 13 00:52:57.660659 env[1460]: time="2025-09-13T00:52:57.660081637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.666812 env[1460]: time="2025-09-13T00:52:57.666768351Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.671890 env[1460]: time="2025-09-13T00:52:57.671851961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.675760 env[1460]: time="2025-09-13T00:52:57.675728269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.676120 env[1460]: time="2025-09-13T00:52:57.676086870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.678000 audit: BPF prog-id=153 op=LOAD Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4072 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336638373561653364313638646432613633666231643932646365 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4072 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336638373561653364313638646432613633666231643932646365 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit: BPF prog-id=154 op=LOAD Sep 13 00:52:57.679000 audit[4156]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e5d20 items=0 ppid=4072 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336638373561653364313638646432613633666231643932646365 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit: BPF prog-id=155 op=LOAD Sep 13 00:52:57.679000 audit[4156]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e5d68 items=0 ppid=4072 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336638373561653364313638646432613633666231643932646365 Sep 13 00:52:57.679000 audit: BPF prog-id=155 op=UNLOAD Sep 13 00:52:57.679000 audit: BPF prog-id=154 op=UNLOAD Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.679000 audit: BPF prog-id=156 op=LOAD Sep 13 00:52:57.679000 audit[4156]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000338178 items=0 ppid=4072 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336638373561653364313638646432613633666231643932646365 Sep 13 00:52:57.683051 env[1460]: time="2025-09-13T00:52:57.681293680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:52:57.687040 env[1460]: time="2025-09-13T00:52:57.687006891Z" level=info msg="CreateContainer within sandbox \"f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 13 00:52:57.706936 env[1460]: time="2025-09-13T00:52:57.706901931Z" level=info msg="StartContainer for \"bd3f875ae3d168dd2a63fb1d92dce7fff5be4ba0b13adb6dcb0ffa8f478fe262\" returns successfully" Sep 13 00:52:57.735000 audit[4168]: AVC avc: denied { getattr } for pid=4168 comm="coredns" path="cgroup:[4026532672]" dev="nsfs" ino=4026532672 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c899 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:52:57.735000 audit[4168]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aac8 a2=c000415968 a3=0 items=0 ppid=4072 pid=4168 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c899 key=(null) Sep 13 00:52:57.735000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:52:57.739975 env[1460]: time="2025-09-13T00:52:57.739935698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58449bd9c9-c5jhp,Uid:0842bc43-2228-4fc2-95c2-c02de91ded9c,Namespace:calico-system,Attempt:1,} returns sandbox id \"ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928\"" Sep 13 00:52:57.742136 env[1460]: time="2025-09-13T00:52:57.742098902Z" level=info msg="CreateContainer within sandbox \"f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"38077c356dd6582c90eeea9bd3a09ee409361217c7a927132e10d61f58cff161\"" Sep 13 00:52:57.742648 env[1460]: time="2025-09-13T00:52:57.742601603Z" level=info msg="StartContainer for \"38077c356dd6582c90eeea9bd3a09ee409361217c7a927132e10d61f58cff161\"" Sep 13 00:52:57.761952 systemd[1]: Started cri-containerd-38077c356dd6582c90eeea9bd3a09ee409361217c7a927132e10d61f58cff161.scope. Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.787000 audit: BPF prog-id=157 op=LOAD Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3832 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303737633335366464363538326339306565656139626433613039 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3832 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303737633335366464363538326339306565656139626433613039 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.788000 audit: BPF prog-id=158 op=LOAD Sep 13 00:52:57.788000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000351cf0 items=0 ppid=3832 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303737633335366464363538326339306565656139626433613039 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit: BPF prog-id=159 op=LOAD Sep 13 00:52:57.789000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000351d38 items=0 ppid=3832 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303737633335366464363538326339306565656139626433613039 Sep 13 00:52:57.789000 audit: BPF prog-id=159 op=UNLOAD Sep 13 00:52:57.789000 audit: BPF prog-id=158 op=UNLOAD Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.789000 audit: BPF prog-id=160 op=LOAD Sep 13 00:52:57.789000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dc148 items=0 ppid=3832 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303737633335366464363538326339306565656139626433613039 Sep 13 00:52:57.820691 env[1460]: time="2025-09-13T00:52:57.820622860Z" level=info msg="StartContainer for \"38077c356dd6582c90eeea9bd3a09ee409361217c7a927132e10d61f58cff161\" returns successfully" Sep 13 00:52:57.826000 audit[4211]: AVC avc: denied { search } for pid=4211 comm="nginx" name="crypto" dev="proc" ino=31031 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c590 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:52:57.826000 audit[4211]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f21697ff728 a2=0 a3=0 items=0 ppid=3832 pid=4211 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c590 key=(null) Sep 13 00:52:57.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 13 00:52:57.945127 env[1460]: time="2025-09-13T00:52:57.945030910Z" level=info msg="StopPodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\"" Sep 13 00:52:57.950165 env[1460]: time="2025-09-13T00:52:57.945030910Z" level=info msg="StopPodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\"" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.007 [INFO][4253] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.007 [INFO][4253] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" iface="eth0" netns="/var/run/netns/cni-e8f5b60c-52a5-1a08-b6f3-47b30ed5e3f0" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.008 [INFO][4253] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" iface="eth0" netns="/var/run/netns/cni-e8f5b60c-52a5-1a08-b6f3-47b30ed5e3f0" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.008 [INFO][4253] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" iface="eth0" netns="/var/run/netns/cni-e8f5b60c-52a5-1a08-b6f3-47b30ed5e3f0" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.008 [INFO][4253] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.008 [INFO][4253] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.066 [INFO][4271] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.066 [INFO][4271] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.066 [INFO][4271] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.075 [WARNING][4271] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.075 [INFO][4271] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.077 [INFO][4271] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:58.081570 env[1460]: 2025-09-13 00:52:58.079 [INFO][4253] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:52:58.082229 env[1460]: time="2025-09-13T00:52:58.081709782Z" level=info msg="TearDown network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" successfully" Sep 13 00:52:58.082229 env[1460]: time="2025-09-13T00:52:58.081743982Z" level=info msg="StopPodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" returns successfully" Sep 13 00:52:58.088352 env[1460]: time="2025-09-13T00:52:58.088311895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p988w,Uid:139bb3f6-e4bb-4467-b6cc-4bdf44d43b16,Namespace:calico-system,Attempt:1,}" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.057 [INFO][4254] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.058 [INFO][4254] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" iface="eth0" netns="/var/run/netns/cni-38f68641-2362-54c0-a050-9b62c79d5ac3" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.059 [INFO][4254] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" iface="eth0" netns="/var/run/netns/cni-38f68641-2362-54c0-a050-9b62c79d5ac3" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.061 [INFO][4254] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" iface="eth0" netns="/var/run/netns/cni-38f68641-2362-54c0-a050-9b62c79d5ac3" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.061 [INFO][4254] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.061 [INFO][4254] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.111 [INFO][4278] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.112 [INFO][4278] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.113 [INFO][4278] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.121 [WARNING][4278] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.121 [INFO][4278] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.125 [INFO][4278] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:58.129903 env[1460]: 2025-09-13 00:52:58.126 [INFO][4254] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:52:58.130710 env[1460]: time="2025-09-13T00:52:58.130674179Z" level=info msg="TearDown network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" successfully" Sep 13 00:52:58.130817 env[1460]: time="2025-09-13T00:52:58.130797479Z" level=info msg="StopPodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" returns successfully" Sep 13 00:52:58.131490 env[1460]: time="2025-09-13T00:52:58.131458480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-wbxlq,Uid:c58b5451-a522-4560-86cc-ec147932482a,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:52:58.166348 systemd[1]: run-containerd-runc-k8s.io-9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5-runc.3i5SRJ.mount: Deactivated successfully. Sep 13 00:52:58.166663 systemd[1]: run-netns-cni\x2d38f68641\x2d2362\x2d54c0\x2da050\x2d9b62c79d5ac3.mount: Deactivated successfully. Sep 13 00:52:58.166839 systemd[1]: run-netns-cni\x2de8f5b60c\x2d52a5\x2d1a08\x2db6f3\x2d47b30ed5e3f0.mount: Deactivated successfully. Sep 13 00:52:58.184908 kubelet[2459]: I0913 00:52:58.184686 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-zslpf" podStartSLOduration=43.184656985 podStartE2EDuration="43.184656985s" podCreationTimestamp="2025-09-13 00:52:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:52:58.139612396 +0000 UTC m=+49.307629289" watchObservedRunningTime="2025-09-13 00:52:58.184656985 +0000 UTC m=+49.352673878" Sep 13 00:52:58.200000 audit[4296]: NETFILTER_CFG table=filter:102 family=2 entries=22 op=nft_register_rule pid=4296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:58.200000 audit[4296]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd982da070 a2=0 a3=7ffd982da05c items=0 ppid=2605 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:58.206000 audit[4296]: NETFILTER_CFG table=nat:103 family=2 entries=12 op=nft_register_rule pid=4296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:58.206000 audit[4296]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd982da070 a2=0 a3=0 items=0 ppid=2605 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:58.292000 audit[4319]: NETFILTER_CFG table=filter:104 family=2 entries=19 op=nft_register_rule pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:58.292000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe11282640 a2=0 a3=7ffe1128262c items=0 ppid=2605 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:58.298000 audit[4319]: NETFILTER_CFG table=nat:105 family=2 entries=33 op=nft_register_chain pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:58.298000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffe11282640 a2=0 a3=7ffe1128262c items=0 ppid=2605 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:58.407010 systemd-networkd[1596]: calie2ed360920b: Link UP Sep 13 00:52:58.420057 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:52:58.420152 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie2ed360920b: link becomes ready Sep 13 00:52:58.420461 systemd-networkd[1596]: calie2ed360920b: Gained carrier Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.237 [INFO][4290] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.266 [INFO][4290] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0 csi-node-driver- calico-system 139bb3f6-e4bb-4467-b6cc-4bdf44d43b16 946 0 2025-09-13 00:52:29 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 csi-node-driver-p988w eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie2ed360920b [] [] }} ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.267 [INFO][4290] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.326 [INFO][4321] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" HandleID="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.326 [INFO][4321] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" HandleID="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-99e6272c46", "pod":"csi-node-driver-p988w", "timestamp":"2025-09-13 00:52:58.326436266 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.326 [INFO][4321] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.326 [INFO][4321] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.327 [INFO][4321] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.343 [INFO][4321] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.351 [INFO][4321] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.358 [INFO][4321] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.361 [INFO][4321] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.366 [INFO][4321] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.366 [INFO][4321] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.367 [INFO][4321] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.377 [INFO][4321] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.387 [INFO][4321] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.69/26] block=192.168.56.64/26 handle="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.388 [INFO][4321] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.69/26] handle="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.388 [INFO][4321] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:58.436469 env[1460]: 2025-09-13 00:52:58.388 [INFO][4321] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.69/26] IPv6=[] ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" HandleID="k8s-pod-network.bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.437426 env[1460]: 2025-09-13 00:52:58.391 [INFO][4290] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"csi-node-driver-p988w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.56.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie2ed360920b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:58.437426 env[1460]: 2025-09-13 00:52:58.391 [INFO][4290] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.69/32] ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.437426 env[1460]: 2025-09-13 00:52:58.391 [INFO][4290] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie2ed360920b ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.437426 env[1460]: 2025-09-13 00:52:58.421 [INFO][4290] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.437426 env[1460]: 2025-09-13 00:52:58.422 [INFO][4290] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c", Pod:"csi-node-driver-p988w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.56.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie2ed360920b", MAC:"e6:6c:39:40:26:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:58.437426 env[1460]: 2025-09-13 00:52:58.434 [INFO][4290] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c" Namespace="calico-system" Pod="csi-node-driver-p988w" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:52:58.451783 env[1460]: time="2025-09-13T00:52:58.451720513Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:58.451936 env[1460]: time="2025-09-13T00:52:58.451797713Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:58.451936 env[1460]: time="2025-09-13T00:52:58.451826313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:58.452044 env[1460]: time="2025-09-13T00:52:58.451995614Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c pid=4348 runtime=io.containerd.runc.v2 Sep 13 00:52:58.484512 systemd[1]: Started cri-containerd-bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c.scope. Sep 13 00:52:58.490305 systemd[1]: run-containerd-runc-k8s.io-bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c-runc.QUuO7j.mount: Deactivated successfully. Sep 13 00:52:58.510358 systemd-networkd[1596]: calie28ccf40b85: Link UP Sep 13 00:52:58.519359 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie28ccf40b85: link becomes ready Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.521860 systemd-networkd[1596]: calie28ccf40b85: Gained carrier Sep 13 00:52:58.528321 kernel: kauditd_printk_skb: 428 callbacks suppressed Sep 13 00:52:58.528401 kernel: audit: type=1400 audit(1757724778.519:1054): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.545291 kernel: audit: type=1400 audit(1757724778.519:1055): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.231 [INFO][4297] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.279 [INFO][4297] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0 calico-apiserver-5d7c85d74f- calico-apiserver c58b5451-a522-4560-86cc-ec147932482a 947 0 2025-09-13 00:52:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5d7c85d74f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 calico-apiserver-5d7c85d74f-wbxlq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie28ccf40b85 [] [] }} ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.279 [INFO][4297] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.347 [INFO][4326] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" HandleID="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.348 [INFO][4326] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" HandleID="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.8-n-99e6272c46", "pod":"calico-apiserver-5d7c85d74f-wbxlq", "timestamp":"2025-09-13 00:52:58.347777508 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.348 [INFO][4326] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.389 [INFO][4326] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.389 [INFO][4326] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.443 [INFO][4326] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.459 [INFO][4326] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.466 [INFO][4326] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.468 [INFO][4326] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.470 [INFO][4326] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.471 [INFO][4326] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.479 [INFO][4326] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5 Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.490 [INFO][4326] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.500 [INFO][4326] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.70/26] block=192.168.56.64/26 handle="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.500 [INFO][4326] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.70/26] handle="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.500 [INFO][4326] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:58.561676 env[1460]: 2025-09-13 00:52:58.500 [INFO][4326] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.70/26] IPv6=[] ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" HandleID="k8s-pod-network.9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.562572 env[1460]: 2025-09-13 00:52:58.504 [INFO][4297] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c58b5451-a522-4560-86cc-ec147932482a", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"calico-apiserver-5d7c85d74f-wbxlq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie28ccf40b85", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:58.562572 env[1460]: 2025-09-13 00:52:58.505 [INFO][4297] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.70/32] ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.562572 env[1460]: 2025-09-13 00:52:58.505 [INFO][4297] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie28ccf40b85 ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.562572 env[1460]: 2025-09-13 00:52:58.523 [INFO][4297] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.562572 env[1460]: 2025-09-13 00:52:58.523 [INFO][4297] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c58b5451-a522-4560-86cc-ec147932482a", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5", Pod:"calico-apiserver-5d7c85d74f-wbxlq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie28ccf40b85", MAC:"b6:dd:96:b7:3d:cf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:58.562572 env[1460]: 2025-09-13 00:52:58.546 [INFO][4297] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5" Namespace="calico-apiserver" Pod="calico-apiserver-5d7c85d74f-wbxlq" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.581881 kernel: audit: type=1400 audit(1757724778.519:1056): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.597855 kernel: audit: type=1400 audit(1757724778.519:1057): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.598014 env[1460]: time="2025-09-13T00:52:58.594955696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p988w,Uid:139bb3f6-e4bb-4467-b6cc-4bdf44d43b16,Namespace:calico-system,Attempt:1,} returns sandbox id \"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c\"" Sep 13 00:52:58.582104 systemd-networkd[1596]: cali1bb2b4fec3b: Gained IPv6LL Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.622531 env[1460]: time="2025-09-13T00:52:58.622450951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:58.622695 env[1460]: time="2025-09-13T00:52:58.622674551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:58.622770 env[1460]: time="2025-09-13T00:52:58.622754751Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:58.622971 env[1460]: time="2025-09-13T00:52:58.622948552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5 pid=4393 runtime=io.containerd.runc.v2 Sep 13 00:52:58.628291 kernel: audit: type=1400 audit(1757724778.519:1058): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.628379 kernel: audit: type=1400 audit(1757724778.519:1059): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.634434 systemd[1]: Started cri-containerd-9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5.scope. Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.658202 kernel: audit: type=1400 audit(1757724778.519:1060): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.658302 kernel: audit: type=1400 audit(1757724778.519:1061): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688433 kernel: audit: type=1400 audit(1757724778.519:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688544 kernel: audit: type=1400 audit(1757724778.520:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.520000 audit: BPF prog-id=161 op=LOAD Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4348 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264623535383764663965303761663333643635633063396337323433 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4348 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264623535383764663965303761663333643635633063396337323433 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.526000 audit: BPF prog-id=162 op=LOAD Sep 13 00:52:58.526000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dec50 items=0 ppid=4348 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264623535383764663965303761663333643635633063396337323433 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit: BPF prog-id=163 op=LOAD Sep 13 00:52:58.559000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000388d28 items=0 ppid=4348 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264623535383764663965303761663333643635633063396337323433 Sep 13 00:52:58.559000 audit: BPF prog-id=163 op=UNLOAD Sep 13 00:52:58.559000 audit: BPF prog-id=162 op=UNLOAD Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.559000 audit: BPF prog-id=164 op=LOAD Sep 13 00:52:58.559000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000389138 items=0 ppid=4348 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264623535383764663965303761663333643635633063396337323433 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.687000 audit: BPF prog-id=165 op=LOAD Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4393 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646131656666393535633131613333323963373339303264313930 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4393 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646131656666393535633131613333323963373339303264313930 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit: BPF prog-id=166 op=LOAD Sep 13 00:52:58.688000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a11f0 items=0 ppid=4393 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646131656666393535633131613333323963373339303264313930 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.688000 audit: BPF prog-id=167 op=LOAD Sep 13 00:52:58.688000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1238 items=0 ppid=4393 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646131656666393535633131613333323963373339303264313930 Sep 13 00:52:58.688000 audit: BPF prog-id=167 op=UNLOAD Sep 13 00:52:58.689000 audit: BPF prog-id=166 op=UNLOAD Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:58.689000 audit: BPF prog-id=168 op=LOAD Sep 13 00:52:58.689000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1648 items=0 ppid=4393 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:58.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646131656666393535633131613333323963373339303264313930 Sep 13 00:52:58.722129 env[1460]: time="2025-09-13T00:52:58.721356546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d7c85d74f-wbxlq,Uid:c58b5451-a522-4560-86cc-ec147932482a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5\"" Sep 13 00:52:58.947318 env[1460]: time="2025-09-13T00:52:58.947273693Z" level=info msg="StopPodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\"" Sep 13 00:52:58.948045 env[1460]: time="2025-09-13T00:52:58.948004394Z" level=info msg="StopPodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\"" Sep 13 00:52:59.003677 kubelet[2459]: I0913 00:52:59.003647 2459 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.074 [INFO][4453] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.074 [INFO][4453] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" iface="eth0" netns="/var/run/netns/cni-23ec9fc8-6193-5735-457f-3f9f39ee29f3" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.091 [INFO][4453] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" iface="eth0" netns="/var/run/netns/cni-23ec9fc8-6193-5735-457f-3f9f39ee29f3" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.091 [INFO][4453] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" iface="eth0" netns="/var/run/netns/cni-23ec9fc8-6193-5735-457f-3f9f39ee29f3" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.091 [INFO][4453] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.091 [INFO][4453] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.154 [INFO][4465] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.154 [INFO][4465] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.154 [INFO][4465] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.165 [WARNING][4465] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.165 [INFO][4465] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.167 [INFO][4465] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:59.182379 env[1460]: 2025-09-13 00:52:59.178 [INFO][4453] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:52:59.190301 systemd[1]: run-netns-cni\x2d23ec9fc8\x2d6193\x2d5735\x2d457f\x2d3f9f39ee29f3.mount: Deactivated successfully. Sep 13 00:52:59.191495 env[1460]: time="2025-09-13T00:52:59.191451169Z" level=info msg="TearDown network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" successfully" Sep 13 00:52:59.191642 env[1460]: time="2025-09-13T00:52:59.191605570Z" level=info msg="StopPodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" returns successfully" Sep 13 00:52:59.192471 env[1460]: time="2025-09-13T00:52:59.192443971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-jb8v5,Uid:92e5d815-a906-4584-bb94-c0beb8a1ea80,Namespace:calico-system,Attempt:1,}" Sep 13 00:52:59.218723 systemd-networkd[1596]: cali4a3f7db9dc1: Gained IPv6LL Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.102 [INFO][4452] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.102 [INFO][4452] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" iface="eth0" netns="/var/run/netns/cni-87013dc7-6a19-3486-4021-f011a53aa55e" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.103 [INFO][4452] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" iface="eth0" netns="/var/run/netns/cni-87013dc7-6a19-3486-4021-f011a53aa55e" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.103 [INFO][4452] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" iface="eth0" netns="/var/run/netns/cni-87013dc7-6a19-3486-4021-f011a53aa55e" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.103 [INFO][4452] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.103 [INFO][4452] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.222 [INFO][4470] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.222 [INFO][4470] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.222 [INFO][4470] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.231 [WARNING][4470] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.232 [INFO][4470] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.236 [INFO][4470] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:59.251109 env[1460]: 2025-09-13 00:52:59.239 [INFO][4452] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:52:59.260577 systemd[1]: run-netns-cni\x2d87013dc7\x2d6a19\x2d3486\x2d4021\x2df011a53aa55e.mount: Deactivated successfully. Sep 13 00:52:59.276121 env[1460]: time="2025-09-13T00:52:59.276048934Z" level=info msg="TearDown network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" successfully" Sep 13 00:52:59.276121 env[1460]: time="2025-09-13T00:52:59.276096134Z" level=info msg="StopPodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" returns successfully" Sep 13 00:52:59.278933 env[1460]: time="2025-09-13T00:52:59.278889739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-jlkth,Uid:c4ac56c6-a9c7-487c-93cf-6f44f00818a0,Namespace:kube-system,Attempt:1,}" Sep 13 00:52:59.369000 audit[4527]: NETFILTER_CFG table=filter:106 family=2 entries=15 op=nft_register_rule pid=4527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:59.369000 audit[4527]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe96ccd370 a2=0 a3=7ffe96ccd35c items=0 ppid=2605 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:59.414000 audit[4527]: NETFILTER_CFG table=nat:107 family=2 entries=25 op=nft_register_chain pid=4527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:59.414000 audit[4527]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffe96ccd370 a2=0 a3=7ffe96ccd35c items=0 ppid=2605 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:59.537772 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:52:59.537870 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibf940aa1b72: link becomes ready Sep 13 00:52:59.526460 systemd-networkd[1596]: calibf940aa1b72: Link UP Sep 13 00:52:59.544058 systemd-networkd[1596]: calibf940aa1b72: Gained carrier Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.306 [INFO][4480] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.349 [INFO][4480] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0 goldmane-54d579b49d- calico-system 92e5d815-a906-4584-bb94-c0beb8a1ea80 972 0 2025-09-13 00:52:29 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:54d579b49d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 goldmane-54d579b49d-jb8v5 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calibf940aa1b72 [] [] }} ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.349 [INFO][4480] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.451 [INFO][4529] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" HandleID="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.451 [INFO][4529] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" HandleID="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.8-n-99e6272c46", "pod":"goldmane-54d579b49d-jb8v5", "timestamp":"2025-09-13 00:52:59.451000474 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.451 [INFO][4529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.451 [INFO][4529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.451 [INFO][4529] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.464 [INFO][4529] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.474 [INFO][4529] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.484 [INFO][4529] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.489 [INFO][4529] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.491 [INFO][4529] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.491 [INFO][4529] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.494 [INFO][4529] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577 Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.502 [INFO][4529] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.515 [INFO][4529] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.71/26] block=192.168.56.64/26 handle="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.515 [INFO][4529] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.71/26] handle="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.515 [INFO][4529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:59.574691 env[1460]: 2025-09-13 00:52:59.515 [INFO][4529] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.71/26] IPv6=[] ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" HandleID="k8s-pod-network.0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.575602 env[1460]: 2025-09-13 00:52:59.518 [INFO][4480] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"92e5d815-a906-4584-bb94-c0beb8a1ea80", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"goldmane-54d579b49d-jb8v5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.56.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibf940aa1b72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:59.575602 env[1460]: 2025-09-13 00:52:59.518 [INFO][4480] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.71/32] ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.575602 env[1460]: 2025-09-13 00:52:59.518 [INFO][4480] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibf940aa1b72 ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.575602 env[1460]: 2025-09-13 00:52:59.543 [INFO][4480] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.575602 env[1460]: 2025-09-13 00:52:59.546 [INFO][4480] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"92e5d815-a906-4584-bb94-c0beb8a1ea80", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577", Pod:"goldmane-54d579b49d-jb8v5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.56.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibf940aa1b72", MAC:"36:4f:64:e4:a9:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:59.575602 env[1460]: 2025-09-13 00:52:59.573 [INFO][4480] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577" Namespace="calico-system" Pod="goldmane-54d579b49d-jb8v5" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:52:59.602917 systemd-networkd[1596]: calie2ed360920b: Gained IPv6LL Sep 13 00:52:59.640431 env[1460]: time="2025-09-13T00:52:59.637574237Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:59.640431 env[1460]: time="2025-09-13T00:52:59.637616937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:59.640431 env[1460]: time="2025-09-13T00:52:59.637645337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:59.640431 env[1460]: time="2025-09-13T00:52:59.637783638Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577 pid=4566 runtime=io.containerd.runc.v2 Sep 13 00:52:59.661538 systemd-networkd[1596]: califc6ba6fdac0: Link UP Sep 13 00:52:59.671709 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califc6ba6fdac0: link becomes ready Sep 13 00:52:59.670957 systemd-networkd[1596]: califc6ba6fdac0: Gained carrier Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.409 [INFO][4516] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.428 [INFO][4516] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0 coredns-674b8bbfcf- kube-system c4ac56c6-a9c7-487c-93cf-6f44f00818a0 974 0 2025-09-13 00:52:15 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.8-n-99e6272c46 coredns-674b8bbfcf-jlkth eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califc6ba6fdac0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.428 [INFO][4516] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.547 [INFO][4546] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" HandleID="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.548 [INFO][4546] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" HandleID="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003326b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.8-n-99e6272c46", "pod":"coredns-674b8bbfcf-jlkth", "timestamp":"2025-09-13 00:52:59.547725362 +0000 UTC"}, Hostname:"ci-3510.3.8-n-99e6272c46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.548 [INFO][4546] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.548 [INFO][4546] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.548 [INFO][4546] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.8-n-99e6272c46' Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.568 [INFO][4546] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.585 [INFO][4546] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.606 [INFO][4546] ipam/ipam.go 511: Trying affinity for 192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.608 [INFO][4546] ipam/ipam.go 158: Attempting to load block cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.613 [INFO][4546] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.56.64/26 host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.613 [INFO][4546] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.56.64/26 handle="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.616 [INFO][4546] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5 Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.621 [INFO][4546] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.56.64/26 handle="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.634 [INFO][4546] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.56.72/26] block=192.168.56.64/26 handle="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.634 [INFO][4546] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.56.72/26] handle="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" host="ci-3510.3.8-n-99e6272c46" Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.634 [INFO][4546] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:59.690327 env[1460]: 2025-09-13 00:52:59.634 [INFO][4546] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.56.72/26] IPv6=[] ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" HandleID="k8s-pod-network.e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.691216 env[1460]: 2025-09-13 00:52:59.636 [INFO][4516] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c4ac56c6-a9c7-487c-93cf-6f44f00818a0", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"", Pod:"coredns-674b8bbfcf-jlkth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc6ba6fdac0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:59.691216 env[1460]: 2025-09-13 00:52:59.636 [INFO][4516] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.56.72/32] ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.691216 env[1460]: 2025-09-13 00:52:59.636 [INFO][4516] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califc6ba6fdac0 ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.691216 env[1460]: 2025-09-13 00:52:59.673 [INFO][4516] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.691216 env[1460]: 2025-09-13 00:52:59.673 [INFO][4516] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c4ac56c6-a9c7-487c-93cf-6f44f00818a0", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5", Pod:"coredns-674b8bbfcf-jlkth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc6ba6fdac0", MAC:"72:69:60:9b:4c:07", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:59.691216 env[1460]: 2025-09-13 00:52:59.688 [INFO][4516] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5" Namespace="kube-system" Pod="coredns-674b8bbfcf-jlkth" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:52:59.702785 systemd[1]: Started cri-containerd-0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577.scope. Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.725000 audit: BPF prog-id=169 op=LOAD Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4566 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062326362613366313732633962396666646662306235313861633865 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4566 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062326362613366313732633962396666646662306235313861633865 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit: BPF prog-id=170 op=LOAD Sep 13 00:52:59.727000 audit[4578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210180 items=0 ppid=4566 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062326362613366313732633962396666646662306235313861633865 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.727000 audit: BPF prog-id=171 op=LOAD Sep 13 00:52:59.727000 audit[4578]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002101c8 items=0 ppid=4566 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062326362613366313732633962396666646662306235313861633865 Sep 13 00:52:59.727000 audit: BPF prog-id=171 op=UNLOAD Sep 13 00:52:59.727000 audit: BPF prog-id=170 op=UNLOAD Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { perfmon } for pid=4578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit[4578]: AVC avc: denied { bpf } for pid=4578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.728000 audit: BPF prog-id=172 op=LOAD Sep 13 00:52:59.728000 audit[4578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002105d8 items=0 ppid=4566 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062326362613366313732633962396666646662306235313861633865 Sep 13 00:52:59.750653 env[1460]: time="2025-09-13T00:52:59.747860652Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:59.750653 env[1460]: time="2025-09-13T00:52:59.747937052Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:59.750653 env[1460]: time="2025-09-13T00:52:59.747964452Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:59.750653 env[1460]: time="2025-09-13T00:52:59.748108652Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5 pid=4608 runtime=io.containerd.runc.v2 Sep 13 00:52:59.785657 systemd[1]: Started cri-containerd-e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5.scope. Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.804000 audit: BPF prog-id=173 op=LOAD Sep 13 00:52:59.805000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.805000 audit[4618]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4608 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530653237323436346633663961373661663138373330343437333532 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4608 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530653237323436346633663961373661663138373330343437333532 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit: BPF prog-id=174 op=LOAD Sep 13 00:52:59.806000 audit[4618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00028b040 items=0 ppid=4608 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530653237323436346633663961373661663138373330343437333532 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.806000 audit: BPF prog-id=175 op=LOAD Sep 13 00:52:59.806000 audit[4618]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00028b088 items=0 ppid=4608 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530653237323436346633663961373661663138373330343437333532 Sep 13 00:52:59.807000 audit: BPF prog-id=175 op=UNLOAD Sep 13 00:52:59.807000 audit: BPF prog-id=174 op=UNLOAD Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { perfmon } for pid=4618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit[4618]: AVC avc: denied { bpf } for pid=4618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.807000 audit: BPF prog-id=176 op=LOAD Sep 13 00:52:59.807000 audit[4618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00028b498 items=0 ppid=4608 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530653237323436346633663961373661663138373330343437333532 Sep 13 00:52:59.858411 env[1460]: time="2025-09-13T00:52:59.857565965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-jb8v5,Uid:92e5d815-a906-4584-bb94-c0beb8a1ea80,Namespace:calico-system,Attempt:1,} returns sandbox id \"0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577\"" Sep 13 00:52:59.860978 env[1460]: time="2025-09-13T00:52:59.860935872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-jlkth,Uid:c4ac56c6-a9c7-487c-93cf-6f44f00818a0,Namespace:kube-system,Attempt:1,} returns sandbox id \"e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5\"" Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit: BPF prog-id=177 op=LOAD Sep 13 00:52:59.990000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9ccc0a50 a2=98 a3=1fffffffffffffff items=0 ppid=4650 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.990000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:59.990000 audit: BPF prog-id=177 op=UNLOAD Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.990000 audit: BPF prog-id=178 op=LOAD Sep 13 00:52:59.990000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9ccc0930 a2=94 a3=3 items=0 ppid=4650 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.990000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:59.991000 audit: BPF prog-id=178 op=UNLOAD Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit: BPF prog-id=179 op=LOAD Sep 13 00:52:59.991000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9ccc0970 a2=94 a3=7ffe9ccc0b50 items=0 ppid=4650 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.991000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:59.991000 audit: BPF prog-id=179 op=UNLOAD Sep 13 00:52:59.991000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.991000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe9ccc0a40 a2=50 a3=a000000085 items=0 ppid=4650 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.991000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit: BPF prog-id=180 op=LOAD Sep 13 00:52:59.993000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd182ba670 a2=98 a3=3 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.993000 audit: BPF prog-id=180 op=UNLOAD Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit: BPF prog-id=181 op=LOAD Sep 13 00:52:59.993000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd182ba460 a2=94 a3=54428f items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.993000 audit: BPF prog-id=181 op=UNLOAD Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.993000 audit: BPF prog-id=182 op=LOAD Sep 13 00:52:59.993000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd182ba490 a2=94 a3=2 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:59.993000 audit: BPF prog-id=182 op=UNLOAD Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit: BPF prog-id=183 op=LOAD Sep 13 00:53:00.105000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd182ba350 a2=94 a3=1 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.105000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.105000 audit: BPF prog-id=183 op=UNLOAD Sep 13 00:53:00.105000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.105000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd182ba420 a2=50 a3=7ffd182ba500 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.105000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.113863 systemd-networkd[1596]: calie28ccf40b85: Gained IPv6LL Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd182ba360 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd182ba390 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd182ba2a0 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd182ba3b0 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd182ba390 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd182ba380 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd182ba3b0 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd182ba390 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd182ba3b0 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd182ba380 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.116000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.116000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd182ba3f0 a2=28 a3=0 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd182ba1a0 a2=50 a3=1 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit: BPF prog-id=184 op=LOAD Sep 13 00:53:00.117000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd182ba1a0 a2=94 a3=5 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.117000 audit: BPF prog-id=184 op=UNLOAD Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd182ba250 a2=50 a3=1 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd182ba370 a2=4 a3=38 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { confidentiality } for pid=4666 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:00.117000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd182ba3c0 a2=94 a3=6 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.117000 audit[4666]: AVC avc: denied { confidentiality } for pid=4666 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:00.117000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd182b9b70 a2=94 a3=88 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { perfmon } for pid=4666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { bpf } for pid=4666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.118000 audit[4666]: AVC avc: denied { confidentiality } for pid=4666 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:00.118000 audit[4666]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd182b9b70 a2=94 a3=88 items=0 ppid=4650 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.118000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit: BPF prog-id=185 op=LOAD Sep 13 00:53:00.126000 audit[4669]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd68e2cfc0 a2=98 a3=1999999999999999 items=0 ppid=4650 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.126000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:53:00.126000 audit: BPF prog-id=185 op=UNLOAD Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit: BPF prog-id=186 op=LOAD Sep 13 00:53:00.126000 audit[4669]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd68e2cea0 a2=94 a3=ffff items=0 ppid=4650 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.126000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:53:00.126000 audit: BPF prog-id=186 op=UNLOAD Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.126000 audit: BPF prog-id=187 op=LOAD Sep 13 00:53:00.126000 audit[4669]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd68e2cee0 a2=94 a3=7ffd68e2d0c0 items=0 ppid=4650 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.126000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:53:00.126000 audit: BPF prog-id=187 op=UNLOAD Sep 13 00:53:00.129112 env[1460]: time="2025-09-13T00:53:00.128866189Z" level=info msg="CreateContainer within sandbox \"e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:53:00.204231 env[1460]: time="2025-09-13T00:53:00.204184833Z" level=info msg="CreateContainer within sandbox \"e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3ba62a06872b7249181175184e71d9b29d405dfd110bf393fc3e38977d52bf05\"" Sep 13 00:53:00.206686 env[1460]: time="2025-09-13T00:53:00.206653438Z" level=info msg="StartContainer for \"3ba62a06872b7249181175184e71d9b29d405dfd110bf393fc3e38977d52bf05\"" Sep 13 00:53:00.249738 systemd[1]: Started cri-containerd-3ba62a06872b7249181175184e71d9b29d405dfd110bf393fc3e38977d52bf05.scope. Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit: BPF prog-id=188 op=LOAD Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4608 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613632613036383732623732343931383131373531383465373164 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4608 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613632613036383732623732343931383131373531383465373164 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.290000 audit: BPF prog-id=189 op=LOAD Sep 13 00:53:00.290000 audit[4690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000187260 items=0 ppid=4608 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613632613036383732623732343931383131373531383465373164 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit: BPF prog-id=190 op=LOAD Sep 13 00:53:00.291000 audit[4690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001872a8 items=0 ppid=4608 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613632613036383732623732343931383131373531383465373164 Sep 13 00:53:00.291000 audit: BPF prog-id=190 op=UNLOAD Sep 13 00:53:00.291000 audit: BPF prog-id=189 op=UNLOAD Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { perfmon } for pid=4690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit[4690]: AVC avc: denied { bpf } for pid=4690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.291000 audit: BPF prog-id=191 op=LOAD Sep 13 00:53:00.291000 audit[4690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001876b8 items=0 ppid=4608 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613632613036383732623732343931383131373531383465373164 Sep 13 00:53:00.325686 env[1460]: time="2025-09-13T00:53:00.325611665Z" level=info msg="StartContainer for \"3ba62a06872b7249181175184e71d9b29d405dfd110bf393fc3e38977d52bf05\" returns successfully" Sep 13 00:53:00.330000 audit[4700]: AVC avc: denied { getattr } for pid=4700 comm="coredns" path="cgroup:[4026532711]" dev="nsfs" ino=4026532711 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c686 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:53:00.330000 audit[4700]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aac8 a2=c000415968 a3=0 items=0 ppid=4608 pid=4700 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c686 key=(null) Sep 13 00:53:00.330000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:53:00.355778 systemd-networkd[1596]: vxlan.calico: Link UP Sep 13 00:53:00.355787 systemd-networkd[1596]: vxlan.calico: Gained carrier Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit: BPF prog-id=192 op=LOAD Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd87486c0 a2=98 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit: BPF prog-id=192 op=UNLOAD Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit: BPF prog-id=193 op=LOAD Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd87484d0 a2=94 a3=54428f items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit: BPF prog-id=193 op=UNLOAD Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit: BPF prog-id=194 op=LOAD Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd8748500 a2=94 a3=2 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit: BPF prog-id=194 op=UNLOAD Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd87483d0 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd8748400 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd8748310 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd8748420 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd8748400 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd87483f0 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd8748420 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd8748400 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd8748420 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.429000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.429000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd87483f0 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd8748460 a2=28 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit: BPF prog-id=195 op=LOAD Sep 13 00:53:00.430000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd87482d0 a2=94 a3=0 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.430000 audit: BPF prog-id=195 op=UNLOAD Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdd87482c0 a2=50 a3=2800 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdd87482c0 a2=50 a3=2800 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit: BPF prog-id=196 op=LOAD Sep 13 00:53:00.430000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd8747ae0 a2=94 a3=2 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.430000 audit: BPF prog-id=196 op=UNLOAD Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.430000 audit: BPF prog-id=197 op=LOAD Sep 13 00:53:00.430000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd8747be0 a2=94 a3=30 items=0 ppid=4650 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.442000 audit: BPF prog-id=198 op=LOAD Sep 13 00:53:00.442000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc19f12cb0 a2=98 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.443000 audit: BPF prog-id=198 op=UNLOAD Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit: BPF prog-id=199 op=LOAD Sep 13 00:53:00.443000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc19f12aa0 a2=94 a3=54428f items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.443000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.443000 audit: BPF prog-id=199 op=UNLOAD Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.443000 audit: BPF prog-id=200 op=LOAD Sep 13 00:53:00.443000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc19f12ad0 a2=94 a3=2 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.443000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.443000 audit: BPF prog-id=200 op=UNLOAD Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.676000 audit: BPF prog-id=201 op=LOAD Sep 13 00:53:00.676000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc19f12990 a2=94 a3=1 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.676000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.677000 audit: BPF prog-id=201 op=UNLOAD Sep 13 00:53:00.677000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.677000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc19f12a60 a2=50 a3=7ffc19f12b40 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.677000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.712000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.712000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19f129a0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.718000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.718000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19f129d0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.718000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.718000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19f128e0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.718000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.718000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19f129f0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.718000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.718000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19f129d0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.719000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.719000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19f129c0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.719000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.719000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19f129f0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.719000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.719000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19f129d0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.719000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.719000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19f129f0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.719000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.719000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19f129c0 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19f12a30 a2=28 a3=0 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc19f127e0 a2=50 a3=1 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.720000 audit: BPF prog-id=202 op=LOAD Sep 13 00:53:00.720000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc19f127e0 a2=94 a3=5 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.721000 audit: BPF prog-id=202 op=UNLOAD Sep 13 00:53:00.721000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.721000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc19f12890 a2=50 a3=1 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc19f129b0 a2=4 a3=38 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.722000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.722000 audit[4734]: AVC avc: denied { confidentiality } for pid=4734 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:00.722000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc19f12a00 a2=94 a3=6 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.722000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.724000 audit[4734]: AVC avc: denied { confidentiality } for pid=4734 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:00.724000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc19f121b0 a2=94 a3=88 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.726000 audit[4734]: AVC avc: denied { confidentiality } for pid=4734 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:00.726000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc19f121b0 a2=94 a3=88 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.726000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.728000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.728000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19f13be0 a2=10 a3=f8f00800 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.728000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.728000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19f13a80 a2=10 a3=3 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.728000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.728000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19f13a20 a2=10 a3=3 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.729000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:00.729000 audit[4734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19f13a20 a2=10 a3=7 items=0 ppid=4650 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.729000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:53:00.738000 audit: BPF prog-id=197 op=UNLOAD Sep 13 00:53:00.966000 audit[4773]: NETFILTER_CFG table=mangle:108 family=2 entries=16 op=nft_register_chain pid=4773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:00.966000 audit[4773]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe1c6f9cb0 a2=0 a3=7ffe1c6f9c9c items=0 ppid=4650 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:00.966000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:01.005000 audit[4772]: NETFILTER_CFG table=nat:109 family=2 entries=15 op=nft_register_chain pid=4772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:01.005000 audit[4772]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffefe2ecef0 a2=0 a3=7ffefe2ecedc items=0 ppid=4650 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.005000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:01.012660 systemd-networkd[1596]: califc6ba6fdac0: Gained IPv6LL Sep 13 00:53:01.052000 audit[4771]: NETFILTER_CFG table=raw:110 family=2 entries=21 op=nft_register_chain pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:01.052000 audit[4771]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdce581d60 a2=0 a3=7ffdce581d4c items=0 ppid=4650 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.052000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:01.073000 audit[4775]: NETFILTER_CFG table=filter:111 family=2 entries=321 op=nft_register_chain pid=4775 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:01.073000 audit[4775]: SYSCALL arch=c000003e syscall=46 success=yes exit=190616 a0=3 a1=7ffe6db0bd20 a2=0 a3=558ea089c000 items=0 ppid=4650 pid=4775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.073000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:01.137816 systemd-networkd[1596]: calibf940aa1b72: Gained IPv6LL Sep 13 00:53:01.193343 kubelet[2459]: I0913 00:53:01.193282 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-jlkth" podStartSLOduration=46.193261621 podStartE2EDuration="46.193261621s" podCreationTimestamp="2025-09-13 00:52:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:53:01.163797565 +0000 UTC m=+52.331814458" watchObservedRunningTime="2025-09-13 00:53:01.193261621 +0000 UTC m=+52.361278414" Sep 13 00:53:01.207000 audit[4786]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.207000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff278b35c0 a2=0 a3=7fff278b35ac items=0 ppid=2605 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.219000 audit[4786]: NETFILTER_CFG table=nat:113 family=2 entries=44 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.219000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff278b35c0 a2=0 a3=7fff278b35ac items=0 ppid=2605 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.219000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.268000 audit[4788]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=4788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.268000 audit[4788]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc3d539350 a2=0 a3=7ffc3d53933c items=0 ppid=2605 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.291000 audit[4788]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.291000 audit[4788]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc3d539350 a2=0 a3=7ffc3d53933c items=0 ppid=2605 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.803261 env[1460]: time="2025-09-13T00:53:01.803217470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:01.808662 env[1460]: time="2025-09-13T00:53:01.808607881Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:01.812001 env[1460]: time="2025-09-13T00:53:01.811972187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:01.815058 env[1460]: time="2025-09-13T00:53:01.815024693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:01.815573 env[1460]: time="2025-09-13T00:53:01.815539394Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:53:01.816754 env[1460]: time="2025-09-13T00:53:01.816702696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 13 00:53:01.822015 env[1460]: time="2025-09-13T00:53:01.821986706Z" level=info msg="CreateContainer within sandbox \"05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:53:01.849831 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3000042420.mount: Deactivated successfully. Sep 13 00:53:01.861147 env[1460]: time="2025-09-13T00:53:01.861092579Z" level=info msg="CreateContainer within sandbox \"05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a072c7c1bdeab8fe17e7eefd942fff49ad5912e76dc503b81e3b1cf24e1e7bf1\"" Sep 13 00:53:01.861896 env[1460]: time="2025-09-13T00:53:01.861867181Z" level=info msg="StartContainer for \"a072c7c1bdeab8fe17e7eefd942fff49ad5912e76dc503b81e3b1cf24e1e7bf1\"" Sep 13 00:53:01.892784 systemd[1]: Started cri-containerd-a072c7c1bdeab8fe17e7eefd942fff49ad5912e76dc503b81e3b1cf24e1e7bf1.scope. Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit: BPF prog-id=203 op=LOAD Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3920 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130373263376331626465616238666531376537656566643934326666 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3920 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130373263376331626465616238666531376537656566643934326666 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit: BPF prog-id=204 op=LOAD Sep 13 00:53:01.904000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002013a0 items=0 ppid=3920 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130373263376331626465616238666531376537656566643934326666 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit: BPF prog-id=205 op=LOAD Sep 13 00:53:01.904000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002013e8 items=0 ppid=3920 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130373263376331626465616238666531376537656566643934326666 Sep 13 00:53:01.904000 audit: BPF prog-id=205 op=UNLOAD Sep 13 00:53:01.904000 audit: BPF prog-id=204 op=UNLOAD Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:01.904000 audit: BPF prog-id=206 op=LOAD Sep 13 00:53:01.904000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002017f8 items=0 ppid=3920 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130373263376331626465616238666531376537656566643934326666 Sep 13 00:53:01.937046 env[1460]: time="2025-09-13T00:53:01.936986822Z" level=info msg="StartContainer for \"a072c7c1bdeab8fe17e7eefd942fff49ad5912e76dc503b81e3b1cf24e1e7bf1\" returns successfully" Sep 13 00:53:01.969756 systemd-networkd[1596]: vxlan.calico: Gained IPv6LL Sep 13 00:53:02.271000 audit[4830]: NETFILTER_CFG table=filter:116 family=2 entries=14 op=nft_register_rule pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:02.271000 audit[4830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcd250efb0 a2=0 a3=7ffcd250ef9c items=0 ppid=2605 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:02.275000 audit[4830]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:02.275000 audit[4830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcd250efb0 a2=0 a3=7ffcd250ef9c items=0 ppid=2605 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:02.925000 audit[4808]: AVC avc: denied { watch } for pid=4808 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.2278922063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c559,c771 tclass=file permissive=0 Sep 13 00:53:02.925000 audit[4808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00278c820 a2=fc6 a3=0 items=0 ppid=3920 pid=4808 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 key=(null) Sep 13 00:53:02.925000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:53:03.150833 kubelet[2459]: I0913 00:53:03.150802 2459 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:05.689308 env[1460]: time="2025-09-13T00:53:05.689259150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:05.693799 env[1460]: time="2025-09-13T00:53:05.693756258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:05.696970 env[1460]: time="2025-09-13T00:53:05.696937164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:05.700092 env[1460]: time="2025-09-13T00:53:05.700062869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:05.700497 env[1460]: time="2025-09-13T00:53:05.700471970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 13 00:53:05.704209 env[1460]: time="2025-09-13T00:53:05.702863774Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 13 00:53:05.725953 env[1460]: time="2025-09-13T00:53:05.725918215Z" level=info msg="CreateContainer within sandbox \"ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 13 00:53:05.758719 env[1460]: time="2025-09-13T00:53:05.758675773Z" level=info msg="CreateContainer within sandbox \"ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f\"" Sep 13 00:53:05.760450 env[1460]: time="2025-09-13T00:53:05.759849375Z" level=info msg="StartContainer for \"4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f\"" Sep 13 00:53:05.813189 kernel: kauditd_printk_skb: 884 callbacks suppressed Sep 13 00:53:05.813327 kernel: audit: type=1400 audit(1757724785.786:1274): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.786000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.794057 systemd[1]: Started cri-containerd-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f.scope. Sep 13 00:53:05.786000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00a979800 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:53:05.837886 kernel: audit: type=1300 audit(1757724785.786:1274): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00a979800 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:53:05.837957 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:53:05.862287 kernel: audit: type=1327 audit(1757724785.786:1274): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:05.862370 kernel: audit: audit_lost=92 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:53:05.786000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:05.903597 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:53:05.903737 kernel: audit: backlog limit exceeded Sep 13 00:53:05.903774 kernel: audit: audit_lost=93 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:53:05.903804 kernel: audit: type=1400 audit(1757724785.787:1275): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.903835 kernel: audit: backlog limit exceeded Sep 13 00:53:05.787000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.787000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0051e04e0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:53:05.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:05.787000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.787000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00a74c8a0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:53:05.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.812000 audit: BPF prog-id=207 op=LOAD Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4116 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:05.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323461333961363839303464353436633838383735646338613435 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4116 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:05.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323461333961363839303464353436633838383735646338613435 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit: BPF prog-id=208 op=LOAD Sep 13 00:53:05.813000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000215550 items=0 ppid=4116 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:05.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323461333961363839303464353436633838383735646338613435 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.813000 audit: BPF prog-id=209 op=LOAD Sep 13 00:53:05.813000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000215598 items=0 ppid=4116 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:05.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323461333961363839303464353436633838383735646338613435 Sep 13 00:53:05.836000 audit: BPF prog-id=209 op=UNLOAD Sep 13 00:53:05.836000 audit: BPF prog-id=208 op=UNLOAD Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.861000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.836000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:05.836000 audit: BPF prog-id=210 op=LOAD Sep 13 00:53:05.836000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b4b10 items=0 ppid=4116 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:05.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323461333961363839303464353436633838383735646338613435 Sep 13 00:53:05.861000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0051e0520 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:53:05.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:05.906000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:05.906000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00a979950 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:53:05.906000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:53:05.944047 env[1460]: time="2025-09-13T00:53:05.943909802Z" level=info msg="StartContainer for \"4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f\" returns successfully" Sep 13 00:53:06.176880 kubelet[2459]: I0913 00:53:06.176811 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5d7c85d74f-g5x2r" podStartSLOduration=35.663321403 podStartE2EDuration="41.176778611s" podCreationTimestamp="2025-09-13 00:52:25 +0000 UTC" firstStartedPulling="2025-09-13 00:52:56.303074287 +0000 UTC m=+47.471091080" lastFinishedPulling="2025-09-13 00:53:01.816531495 +0000 UTC m=+52.984548288" observedRunningTime="2025-09-13 00:53:02.182193379 +0000 UTC m=+53.350210172" watchObservedRunningTime="2025-09-13 00:53:06.176778611 +0000 UTC m=+57.344795504" Sep 13 00:53:06.217135 kubelet[2459]: I0913 00:53:06.216453 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-58449bd9c9-c5jhp" podStartSLOduration=29.255648308 podStartE2EDuration="37.21643488s" podCreationTimestamp="2025-09-13 00:52:29 +0000 UTC" firstStartedPulling="2025-09-13 00:52:57.741349201 +0000 UTC m=+48.909366094" lastFinishedPulling="2025-09-13 00:53:05.702135873 +0000 UTC m=+56.870152666" observedRunningTime="2025-09-13 00:53:06.179713816 +0000 UTC m=+57.347730709" watchObservedRunningTime="2025-09-13 00:53:06.21643488 +0000 UTC m=+57.384451673" Sep 13 00:53:06.421000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:06.421000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:06.421000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025b6db0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:53:06.421000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00097e440 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:53:06.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:06.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:08.375750 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount791284069.mount: Deactivated successfully. Sep 13 00:53:08.417257 env[1460]: time="2025-09-13T00:53:08.417208986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.421776 env[1460]: time="2025-09-13T00:53:08.421731094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.424918 env[1460]: time="2025-09-13T00:53:08.424880099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.427995 env[1460]: time="2025-09-13T00:53:08.427960805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:08.428466 env[1460]: time="2025-09-13T00:53:08.428434305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 13 00:53:08.432944 env[1460]: time="2025-09-13T00:53:08.432393712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:53:08.442186 env[1460]: time="2025-09-13T00:53:08.442136529Z" level=info msg="CreateContainer within sandbox \"f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 13 00:53:08.484099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1711979604.mount: Deactivated successfully. Sep 13 00:53:08.499127 env[1460]: time="2025-09-13T00:53:08.499077926Z" level=info msg="CreateContainer within sandbox \"f3c91e26be5cc09abe7fe655e9a9e13ab8fc2d15b1ab5884dbcd257ab09f08cb\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"b31042834bf168c70f343eef26b0924b85b94a27a8a360c3e8e27bba6cb62e84\"" Sep 13 00:53:08.500920 env[1460]: time="2025-09-13T00:53:08.499895727Z" level=info msg="StartContainer for \"b31042834bf168c70f343eef26b0924b85b94a27a8a360c3e8e27bba6cb62e84\"" Sep 13 00:53:08.534390 systemd[1]: Started cri-containerd-b31042834bf168c70f343eef26b0924b85b94a27a8a360c3e8e27bba6cb62e84.scope. Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.545000 audit: BPF prog-id=211 op=LOAD Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3832 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313034323833346266313638633730663334336565663236623039 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3832 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313034323833346266313638633730663334336565663236623039 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit: BPF prog-id=212 op=LOAD Sep 13 00:53:08.546000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000288810 items=0 ppid=3832 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313034323833346266313638633730663334336565663236623039 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit: BPF prog-id=213 op=LOAD Sep 13 00:53:08.546000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000288858 items=0 ppid=3832 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313034323833346266313638633730663334336565663236623039 Sep 13 00:53:08.546000 audit: BPF prog-id=213 op=UNLOAD Sep 13 00:53:08.546000 audit: BPF prog-id=212 op=UNLOAD Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:08.546000 audit: BPF prog-id=214 op=LOAD Sep 13 00:53:08.546000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000288c68 items=0 ppid=3832 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313034323833346266313638633730663334336565663236623039 Sep 13 00:53:08.582642 env[1460]: time="2025-09-13T00:53:08.582579568Z" level=info msg="StartContainer for \"b31042834bf168c70f343eef26b0924b85b94a27a8a360c3e8e27bba6cb62e84\" returns successfully" Sep 13 00:53:08.937771 env[1460]: time="2025-09-13T00:53:08.937723972Z" level=info msg="StopPodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\"" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.970 [WARNING][4953] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2147640-97b0-4945-9ff9-730c9fd768d0", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9", Pod:"calico-apiserver-5d7c85d74f-g5x2r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali289fe135f2d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.971 [INFO][4953] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.971 [INFO][4953] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" iface="eth0" netns="" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.971 [INFO][4953] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.971 [INFO][4953] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.994 [INFO][4962] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.994 [INFO][4962] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:08.994 [INFO][4962] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:09.001 [WARNING][4962] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:09.002 [INFO][4962] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:09.003 [INFO][4962] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.005507 env[1460]: 2025-09-13 00:53:09.004 [INFO][4953] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.005974 env[1460]: time="2025-09-13T00:53:09.005528587Z" level=info msg="TearDown network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" successfully" Sep 13 00:53:09.005974 env[1460]: time="2025-09-13T00:53:09.005566887Z" level=info msg="StopPodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" returns successfully" Sep 13 00:53:09.006404 env[1460]: time="2025-09-13T00:53:09.006371489Z" level=info msg="RemovePodSandbox for \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\"" Sep 13 00:53:09.006504 env[1460]: time="2025-09-13T00:53:09.006408089Z" level=info msg="Forcibly stopping sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\"" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.043 [WARNING][4977] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2147640-97b0-4945-9ff9-730c9fd768d0", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"05a0946e2b2b1e8adfccd1446db81511937d83337ab77f97be9582561d366fb9", Pod:"calico-apiserver-5d7c85d74f-g5x2r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali289fe135f2d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.043 [INFO][4977] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.043 [INFO][4977] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" iface="eth0" netns="" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.043 [INFO][4977] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.043 [INFO][4977] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.064 [INFO][4984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.064 [INFO][4984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.064 [INFO][4984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.070 [WARNING][4984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.070 [INFO][4984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" HandleID="k8s-pod-network.35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--g5x2r-eth0" Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.071 [INFO][4984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.073808 env[1460]: 2025-09-13 00:53:09.072 [INFO][4977] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459" Sep 13 00:53:09.074417 env[1460]: time="2025-09-13T00:53:09.073841902Z" level=info msg="TearDown network for sandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" successfully" Sep 13 00:53:09.084387 env[1460]: time="2025-09-13T00:53:09.084351920Z" level=info msg="RemovePodSandbox \"35217e397833ad6c2c9b453ad1c11aecf1c9120e2610a2a65d1768aff284c459\" returns successfully" Sep 13 00:53:09.084895 env[1460]: time="2025-09-13T00:53:09.084856520Z" level=info msg="StopPodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\"" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.115 [WARNING][4998] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"3c6f78d0-da77-44c3-b47d-2022e353b3d8", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5", Pod:"coredns-674b8bbfcf-zslpf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1bb2b4fec3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.116 [INFO][4998] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.116 [INFO][4998] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" iface="eth0" netns="" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.116 [INFO][4998] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.116 [INFO][4998] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.144 [INFO][5005] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.145 [INFO][5005] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.145 [INFO][5005] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.155 [WARNING][5005] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.155 [INFO][5005] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.158 [INFO][5005] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.162655 env[1460]: 2025-09-13 00:53:09.159 [INFO][4998] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.162655 env[1460]: time="2025-09-13T00:53:09.161545949Z" level=info msg="TearDown network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" successfully" Sep 13 00:53:09.162655 env[1460]: time="2025-09-13T00:53:09.161582149Z" level=info msg="StopPodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" returns successfully" Sep 13 00:53:09.163758 env[1460]: time="2025-09-13T00:53:09.163724053Z" level=info msg="RemovePodSandbox for \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\"" Sep 13 00:53:09.163852 env[1460]: time="2025-09-13T00:53:09.163765353Z" level=info msg="Forcibly stopping sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\"" Sep 13 00:53:09.230000 audit[5027]: NETFILTER_CFG table=filter:118 family=2 entries=13 op=nft_register_rule pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:09.230000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffb8c8fb40 a2=0 a3=7fffb8c8fb2c items=0 ppid=2605 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:09.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:09.235000 audit[5027]: NETFILTER_CFG table=nat:119 family=2 entries=27 op=nft_register_chain pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:09.235000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffb8c8fb40 a2=0 a3=7fffb8c8fb2c items=0 ppid=2605 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:09.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.228 [WARNING][5020] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"3c6f78d0-da77-44c3-b47d-2022e353b3d8", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"9427b740cf2944231050437fa0ac8cd97adbc92dcf4d6fa75b8c4556ba0cb5e5", Pod:"coredns-674b8bbfcf-zslpf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1bb2b4fec3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.229 [INFO][5020] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.229 [INFO][5020] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" iface="eth0" netns="" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.229 [INFO][5020] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.229 [INFO][5020] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.251 [INFO][5029] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.251 [INFO][5029] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.251 [INFO][5029] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.258 [WARNING][5029] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.258 [INFO][5029] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" HandleID="k8s-pod-network.e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--zslpf-eth0" Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.259 [INFO][5029] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.261235 env[1460]: 2025-09-13 00:53:09.260 [INFO][5020] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633" Sep 13 00:53:09.262074 env[1460]: time="2025-09-13T00:53:09.261265916Z" level=info msg="TearDown network for sandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" successfully" Sep 13 00:53:09.268095 env[1460]: time="2025-09-13T00:53:09.268056328Z" level=info msg="RemovePodSandbox \"e1a9c00551cc20486dec451ce790fac922360a4eaba842d3251c48d430c29633\" returns successfully" Sep 13 00:53:09.268595 env[1460]: time="2025-09-13T00:53:09.268567029Z" level=info msg="StopPodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\"" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.301 [WARNING][5044] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c", Pod:"csi-node-driver-p988w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.56.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie2ed360920b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.302 [INFO][5044] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.302 [INFO][5044] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" iface="eth0" netns="" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.302 [INFO][5044] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.302 [INFO][5044] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.322 [INFO][5051] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.323 [INFO][5051] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.323 [INFO][5051] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.328 [WARNING][5051] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.328 [INFO][5051] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.330 [INFO][5051] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.332083 env[1460]: 2025-09-13 00:53:09.330 [INFO][5044] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.332745 env[1460]: time="2025-09-13T00:53:09.332128235Z" level=info msg="TearDown network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" successfully" Sep 13 00:53:09.332745 env[1460]: time="2025-09-13T00:53:09.332163135Z" level=info msg="StopPodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" returns successfully" Sep 13 00:53:09.332745 env[1460]: time="2025-09-13T00:53:09.332709936Z" level=info msg="RemovePodSandbox for \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\"" Sep 13 00:53:09.332855 env[1460]: time="2025-09-13T00:53:09.332745336Z" level=info msg="Forcibly stopping sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\"" Sep 13 00:53:09.376903 systemd[1]: run-containerd-runc-k8s.io-b31042834bf168c70f343eef26b0924b85b94a27a8a360c3e8e27bba6cb62e84-runc.4Wtdwj.mount: Deactivated successfully. Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.362 [WARNING][5066] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139bb3f6-e4bb-4467-b6cc-4bdf44d43b16", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c", Pod:"csi-node-driver-p988w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.56.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie2ed360920b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.363 [INFO][5066] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.363 [INFO][5066] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" iface="eth0" netns="" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.363 [INFO][5066] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.363 [INFO][5066] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.392 [INFO][5073] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.392 [INFO][5073] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.393 [INFO][5073] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.398 [WARNING][5073] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.398 [INFO][5073] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" HandleID="k8s-pod-network.9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Workload="ci--3510.3.8--n--99e6272c46-k8s-csi--node--driver--p988w-eth0" Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.399 [INFO][5073] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.401315 env[1460]: 2025-09-13 00:53:09.400 [INFO][5066] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7" Sep 13 00:53:09.401948 env[1460]: time="2025-09-13T00:53:09.401344452Z" level=info msg="TearDown network for sandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" successfully" Sep 13 00:53:09.408064 env[1460]: time="2025-09-13T00:53:09.408027163Z" level=info msg="RemovePodSandbox \"9d303789afde5209bde709b26704791eb76114def78c7919e46a5c54e5ccf7a7\" returns successfully" Sep 13 00:53:09.408659 env[1460]: time="2025-09-13T00:53:09.408618664Z" level=info msg="StopPodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\"" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.447 [WARNING][5087] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c58b5451-a522-4560-86cc-ec147932482a", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5", Pod:"calico-apiserver-5d7c85d74f-wbxlq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie28ccf40b85", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.449 [INFO][5087] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.449 [INFO][5087] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" iface="eth0" netns="" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.449 [INFO][5087] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.450 [INFO][5087] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.468 [INFO][5094] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.468 [INFO][5094] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.468 [INFO][5094] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.474 [WARNING][5094] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.474 [INFO][5094] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.475 [INFO][5094] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.477450 env[1460]: 2025-09-13 00:53:09.476 [INFO][5087] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.478415 env[1460]: time="2025-09-13T00:53:09.477486579Z" level=info msg="TearDown network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" successfully" Sep 13 00:53:09.478415 env[1460]: time="2025-09-13T00:53:09.477526479Z" level=info msg="StopPodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" returns successfully" Sep 13 00:53:09.478415 env[1460]: time="2025-09-13T00:53:09.478072680Z" level=info msg="RemovePodSandbox for \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\"" Sep 13 00:53:09.478415 env[1460]: time="2025-09-13T00:53:09.478110180Z" level=info msg="Forcibly stopping sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\"" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.509 [WARNING][5109] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0", GenerateName:"calico-apiserver-5d7c85d74f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c58b5451-a522-4560-86cc-ec147932482a", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d7c85d74f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5", Pod:"calico-apiserver-5d7c85d74f-wbxlq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.56.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie28ccf40b85", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.509 [INFO][5109] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.510 [INFO][5109] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" iface="eth0" netns="" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.510 [INFO][5109] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.510 [INFO][5109] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.532 [INFO][5117] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.533 [INFO][5117] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.533 [INFO][5117] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.538 [WARNING][5117] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.538 [INFO][5117] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" HandleID="k8s-pod-network.d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--apiserver--5d7c85d74f--wbxlq-eth0" Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.540 [INFO][5117] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.544757 env[1460]: 2025-09-13 00:53:09.543 [INFO][5109] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd" Sep 13 00:53:09.545266 env[1460]: time="2025-09-13T00:53:09.545241193Z" level=info msg="TearDown network for sandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" successfully" Sep 13 00:53:09.551906 env[1460]: time="2025-09-13T00:53:09.551868204Z" level=info msg="RemovePodSandbox \"d0c05ce2cf903b2c3d6964eeb00196ba876d3dffd905a5e361ced3de49e2b6fd\" returns successfully" Sep 13 00:53:09.552346 env[1460]: time="2025-09-13T00:53:09.552321205Z" level=info msg="StopPodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\"" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.582 [WARNING][5132] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.582 [INFO][5132] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.582 [INFO][5132] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" iface="eth0" netns="" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.582 [INFO][5132] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.582 [INFO][5132] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.604 [INFO][5140] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.604 [INFO][5140] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.604 [INFO][5140] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.610 [WARNING][5140] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.611 [INFO][5140] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.613 [INFO][5140] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.615283 env[1460]: 2025-09-13 00:53:09.614 [INFO][5132] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.615841 env[1460]: time="2025-09-13T00:53:09.615307811Z" level=info msg="TearDown network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" successfully" Sep 13 00:53:09.615841 env[1460]: time="2025-09-13T00:53:09.615337811Z" level=info msg="StopPodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" returns successfully" Sep 13 00:53:09.615915 env[1460]: time="2025-09-13T00:53:09.615858012Z" level=info msg="RemovePodSandbox for \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\"" Sep 13 00:53:09.615954 env[1460]: time="2025-09-13T00:53:09.615890512Z" level=info msg="Forcibly stopping sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\"" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.656 [WARNING][5154] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" WorkloadEndpoint="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.656 [INFO][5154] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.656 [INFO][5154] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" iface="eth0" netns="" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.656 [INFO][5154] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.656 [INFO][5154] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.678 [INFO][5162] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.678 [INFO][5162] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.678 [INFO][5162] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.684 [WARNING][5162] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.685 [INFO][5162] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" HandleID="k8s-pod-network.4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Workload="ci--3510.3.8--n--99e6272c46-k8s-whisker--5f7b4c9d88--g4s6v-eth0" Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.686 [INFO][5162] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:09.688356 env[1460]: 2025-09-13 00:53:09.686 [INFO][5154] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec" Sep 13 00:53:09.688925 env[1460]: time="2025-09-13T00:53:09.688410333Z" level=info msg="TearDown network for sandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" successfully" Sep 13 00:53:10.463000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:10.463000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00097fd80 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:53:10.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:10.464000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:10.464000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00210cce0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:53:10.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:10.464000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:10.464000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00210cd00 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:53:10.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:10.464000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:53:10.464000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00210cec0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:53:10.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:53:10.536288 env[1460]: time="2025-09-13T00:53:10.536233844Z" level=info msg="RemovePodSandbox \"4a17dbe1f71556c9e7d92383fa3bdff4dcc91a56f2e7b3a4084da522491f39ec\" returns successfully" Sep 13 00:53:10.539223 env[1460]: time="2025-09-13T00:53:10.539177049Z" level=info msg="StopPodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\"" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.586 [WARNING][5177] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"92e5d815-a906-4584-bb94-c0beb8a1ea80", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577", Pod:"goldmane-54d579b49d-jb8v5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.56.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibf940aa1b72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.586 [INFO][5177] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.586 [INFO][5177] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" iface="eth0" netns="" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.586 [INFO][5177] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.586 [INFO][5177] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.605 [INFO][5184] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.606 [INFO][5184] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.606 [INFO][5184] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.611 [WARNING][5184] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.611 [INFO][5184] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.613 [INFO][5184] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:10.615774 env[1460]: 2025-09-13 00:53:10.614 [INFO][5177] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.616430 env[1460]: time="2025-09-13T00:53:10.615812276Z" level=info msg="TearDown network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" successfully" Sep 13 00:53:10.616430 env[1460]: time="2025-09-13T00:53:10.615847776Z" level=info msg="StopPodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" returns successfully" Sep 13 00:53:10.616560 env[1460]: time="2025-09-13T00:53:10.616421977Z" level=info msg="RemovePodSandbox for \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\"" Sep 13 00:53:10.616560 env[1460]: time="2025-09-13T00:53:10.616478577Z" level=info msg="Forcibly stopping sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\"" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.648 [WARNING][5198] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"92e5d815-a906-4584-bb94-c0beb8a1ea80", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577", Pod:"goldmane-54d579b49d-jb8v5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.56.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibf940aa1b72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.648 [INFO][5198] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.648 [INFO][5198] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" iface="eth0" netns="" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.648 [INFO][5198] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.648 [INFO][5198] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.675 [INFO][5205] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.675 [INFO][5205] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.676 [INFO][5205] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.682 [WARNING][5205] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.682 [INFO][5205] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" HandleID="k8s-pod-network.c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Workload="ci--3510.3.8--n--99e6272c46-k8s-goldmane--54d579b49d--jb8v5-eth0" Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.683 [INFO][5205] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:10.685931 env[1460]: 2025-09-13 00:53:10.684 [INFO][5198] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c" Sep 13 00:53:10.686546 env[1460]: time="2025-09-13T00:53:10.685963892Z" level=info msg="TearDown network for sandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" successfully" Sep 13 00:53:13.984517 env[1460]: time="2025-09-13T00:53:13.984473729Z" level=info msg="RemovePodSandbox \"c9f1f43ed74899ff76ca6cf5ed1bd623faec66398ec9ed3a2904a0896d30e21c\" returns successfully" Sep 13 00:53:13.985503 env[1460]: time="2025-09-13T00:53:13.985476331Z" level=info msg="StopPodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\"" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.043 [WARNING][5229] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0", GenerateName:"calico-kube-controllers-58449bd9c9-", Namespace:"calico-system", SelfLink:"", UID:"0842bc43-2228-4fc2-95c2-c02de91ded9c", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58449bd9c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928", Pod:"calico-kube-controllers-58449bd9c9-c5jhp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a3f7db9dc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.043 [INFO][5229] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.043 [INFO][5229] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" iface="eth0" netns="" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.043 [INFO][5229] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.043 [INFO][5229] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.088 [INFO][5236] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.088 [INFO][5236] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.088 [INFO][5236] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.095 [WARNING][5236] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.095 [INFO][5236] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.096 [INFO][5236] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:14.100074 env[1460]: 2025-09-13 00:53:14.098 [INFO][5229] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.100548 env[1460]: time="2025-09-13T00:53:14.100521012Z" level=info msg="TearDown network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" successfully" Sep 13 00:53:14.100598 env[1460]: time="2025-09-13T00:53:14.100587712Z" level=info msg="StopPodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" returns successfully" Sep 13 00:53:14.101187 env[1460]: time="2025-09-13T00:53:14.101157713Z" level=info msg="RemovePodSandbox for \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\"" Sep 13 00:53:14.101343 env[1460]: time="2025-09-13T00:53:14.101303513Z" level=info msg="Forcibly stopping sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\"" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.170 [WARNING][5251] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0", GenerateName:"calico-kube-controllers-58449bd9c9-", Namespace:"calico-system", SelfLink:"", UID:"0842bc43-2228-4fc2-95c2-c02de91ded9c", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58449bd9c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"ce440e450a38cccbf0acf0b4fea3919701c6bd8b6582098ad7fd7e4d2af06928", Pod:"calico-kube-controllers-58449bd9c9-c5jhp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.56.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a3f7db9dc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.174 [INFO][5251] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.174 [INFO][5251] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" iface="eth0" netns="" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.174 [INFO][5251] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.174 [INFO][5251] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.211 [INFO][5258] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.211 [INFO][5258] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.212 [INFO][5258] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.220 [WARNING][5258] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.220 [INFO][5258] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" HandleID="k8s-pod-network.1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Workload="ci--3510.3.8--n--99e6272c46-k8s-calico--kube--controllers--58449bd9c9--c5jhp-eth0" Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.222 [INFO][5258] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:14.224342 env[1460]: 2025-09-13 00:53:14.223 [INFO][5251] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc" Sep 13 00:53:14.225140 env[1460]: time="2025-09-13T00:53:14.225101308Z" level=info msg="TearDown network for sandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" successfully" Sep 13 00:53:14.232899 env[1460]: time="2025-09-13T00:53:14.232856820Z" level=info msg="RemovePodSandbox \"1ecb6dfb570b1f1820b327b5226a902f6a10fcf72c9f3182d29954ef6ba626fc\" returns successfully" Sep 13 00:53:14.233622 env[1460]: time="2025-09-13T00:53:14.233595722Z" level=info msg="StopPodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\"" Sep 13 00:53:14.274855 env[1460]: time="2025-09-13T00:53:14.273708985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.282145 env[1460]: time="2025-09-13T00:53:14.281468197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.284958 env[1460]: time="2025-09-13T00:53:14.284921902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.288126 env[1460]: time="2025-09-13T00:53:14.288093207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.288998 env[1460]: time="2025-09-13T00:53:14.288974509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:53:14.292043 env[1460]: time="2025-09-13T00:53:14.292012413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:53:14.299377 env[1460]: time="2025-09-13T00:53:14.299343625Z" level=info msg="CreateContainer within sandbox \"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:53:14.336815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1907659963.mount: Deactivated successfully. Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.288 [WARNING][5274] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c4ac56c6-a9c7-487c-93cf-6f44f00818a0", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5", Pod:"coredns-674b8bbfcf-jlkth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc6ba6fdac0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.288 [INFO][5274] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.288 [INFO][5274] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" iface="eth0" netns="" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.288 [INFO][5274] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.288 [INFO][5274] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.315 [INFO][5281] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.316 [INFO][5281] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.316 [INFO][5281] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.326 [WARNING][5281] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.326 [INFO][5281] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.327 [INFO][5281] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:14.338188 env[1460]: 2025-09-13 00:53:14.330 [INFO][5274] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.338791 env[1460]: time="2025-09-13T00:53:14.338224886Z" level=info msg="TearDown network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" successfully" Sep 13 00:53:14.338791 env[1460]: time="2025-09-13T00:53:14.338260886Z" level=info msg="StopPodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" returns successfully" Sep 13 00:53:14.338791 env[1460]: time="2025-09-13T00:53:14.338756587Z" level=info msg="RemovePodSandbox for \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\"" Sep 13 00:53:14.338907 env[1460]: time="2025-09-13T00:53:14.338793187Z" level=info msg="Forcibly stopping sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\"" Sep 13 00:53:14.346045 env[1460]: time="2025-09-13T00:53:14.345998398Z" level=info msg="CreateContainer within sandbox \"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5fc71b66d7a309e8cd69b8eeab0f6bb34dc780578a5dd0287b6faa5d86d5d1ec\"" Sep 13 00:53:14.346846 env[1460]: time="2025-09-13T00:53:14.346816300Z" level=info msg="StartContainer for \"5fc71b66d7a309e8cd69b8eeab0f6bb34dc780578a5dd0287b6faa5d86d5d1ec\"" Sep 13 00:53:14.376850 kubelet[2459]: I0913 00:53:14.376812 2459 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:14.393740 systemd[1]: Started cri-containerd-5fc71b66d7a309e8cd69b8eeab0f6bb34dc780578a5dd0287b6faa5d86d5d1ec.scope. Sep 13 00:53:14.412292 kubelet[2459]: I0913 00:53:14.411767 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-57f757f647-cqnt2" podStartSLOduration=6.82648274 podStartE2EDuration="19.411746002s" podCreationTimestamp="2025-09-13 00:52:55 +0000 UTC" firstStartedPulling="2025-09-13 00:52:55.845307947 +0000 UTC m=+47.013324740" lastFinishedPulling="2025-09-13 00:53:08.430571109 +0000 UTC m=+59.598588002" observedRunningTime="2025-09-13 00:53:09.19798511 +0000 UTC m=+60.366001903" watchObservedRunningTime="2025-09-13 00:53:14.411746002 +0000 UTC m=+65.579762895" Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.463128 kernel: kauditd_printk_skb: 148 callbacks suppressed Sep 13 00:53:14.463212 kernel: audit: type=1400 audit(1757724794.456:1323): avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5f811f9e38 items=0 ppid=4348 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633731623636643761333039653863643639623865656162306636 Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.447 [WARNING][5295] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c4ac56c6-a9c7-487c-93cf-6f44f00818a0", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.8-n-99e6272c46", ContainerID:"e0e272464f3f9a76af1873044735262f7b17e5a227d75e6960b5ec97348907e5", Pod:"coredns-674b8bbfcf-jlkth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.56.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc6ba6fdac0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.447 [INFO][5295] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.447 [INFO][5295] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" iface="eth0" netns="" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.448 [INFO][5295] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.448 [INFO][5295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.502 [INFO][5326] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.504 [INFO][5326] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.504 [INFO][5326] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.514 [WARNING][5326] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.514 [INFO][5326] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" HandleID="k8s-pod-network.e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Workload="ci--3510.3.8--n--99e6272c46-k8s-coredns--674b8bbfcf--jlkth-eth0" Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.516 [INFO][5326] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:14.525714 env[1460]: 2025-09-13 00:53:14.518 [INFO][5295] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c" Sep 13 00:53:14.525714 env[1460]: time="2025-09-13T00:53:14.519093071Z" level=info msg="TearDown network for sandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" successfully" Sep 13 00:53:14.532342 kernel: audit: type=1300 audit(1757724794.456:1323): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5f811f9e38 items=0 ppid=4348 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.542729 kernel: audit: type=1327 audit(1757724794.456:1323): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633731623636643761333039653863643639623865656162306636 Sep 13 00:53:14.542792 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.542885 env[1460]: time="2025-09-13T00:53:14.535028396Z" level=info msg="StartContainer for \"5fc71b66d7a309e8cd69b8eeab0f6bb34dc780578a5dd0287b6faa5d86d5d1ec\" returns successfully" Sep 13 00:53:14.542885 env[1460]: time="2025-09-13T00:53:14.536156398Z" level=info msg="RemovePodSandbox \"e2fe601cb3f94c0cec37e71d528360aedc0ead7561398c44777041ea987b092c\" returns successfully" Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.562501 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.562838 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.592003 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.592118 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.609686 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.622677 kernel: audit: type=1400 audit(1757724794.456:1324): avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit: BPF prog-id=215 op=LOAD Sep 13 00:53:14.456000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00035ac08 items=0 ppid=4348 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633731623636643761333039653863643639623865656162306636 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit: BPF prog-id=216 op=LOAD Sep 13 00:53:14.456000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00035ac58 items=0 ppid=4348 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633731623636643761333039653863643639623865656162306636 Sep 13 00:53:14.456000 audit: BPF prog-id=216 op=UNLOAD Sep 13 00:53:14.456000 audit: BPF prog-id=215 op=UNLOAD Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.456000 audit: BPF prog-id=217 op=LOAD Sep 13 00:53:14.456000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00035ace8 items=0 ppid=4348 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633731623636643761333039653863643639623865656162306636 Sep 13 00:53:14.484000 audit[5330]: NETFILTER_CFG table=filter:120 family=2 entries=11 op=nft_register_rule pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:14.484000 audit[5330]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc47f88fe0 a2=0 a3=7ffc47f88fcc items=0 ppid=2605 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:14.515000 audit[5330]: NETFILTER_CFG table=nat:121 family=2 entries=29 op=nft_register_chain pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:14.515000 audit[5330]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffc47f88fe0 a2=0 a3=7ffc47f88fcc items=0 ppid=2605 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:14.788527 env[1460]: time="2025-09-13T00:53:14.786935792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.791725 env[1460]: time="2025-09-13T00:53:14.791690400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.794855 env[1460]: time="2025-09-13T00:53:14.794824305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.797845 env[1460]: time="2025-09-13T00:53:14.797811109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:14.798323 env[1460]: time="2025-09-13T00:53:14.798291410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:53:14.801008 env[1460]: time="2025-09-13T00:53:14.800331213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 13 00:53:14.807780 env[1460]: time="2025-09-13T00:53:14.807749325Z" level=info msg="CreateContainer within sandbox \"9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:53:14.841317 env[1460]: time="2025-09-13T00:53:14.841238778Z" level=info msg="CreateContainer within sandbox \"9ada1eff955c11a3329c73902d190733f0631515edf83c1571ab3321758bc3e5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"dc2759457d4e9ce915010589f2a0b9e07a0fe82f80f65972381eafafe87e230b\"" Sep 13 00:53:14.843027 env[1460]: time="2025-09-13T00:53:14.842996081Z" level=info msg="StartContainer for \"dc2759457d4e9ce915010589f2a0b9e07a0fe82f80f65972381eafafe87e230b\"" Sep 13 00:53:14.860476 systemd[1]: Started cri-containerd-dc2759457d4e9ce915010589f2a0b9e07a0fe82f80f65972381eafafe87e230b.scope. Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit: BPF prog-id=218 op=LOAD Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4393 pid=5350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323735393435376434653963653931353031303538396632613062 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4393 pid=5350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323735393435376434653963653931353031303538396632613062 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit: BPF prog-id=219 op=LOAD Sep 13 00:53:14.874000 audit[5350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003c2810 items=0 ppid=4393 pid=5350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323735393435376434653963653931353031303538396632613062 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.874000 audit: BPF prog-id=220 op=LOAD Sep 13 00:53:14.874000 audit[5350]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003c2858 items=0 ppid=4393 pid=5350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323735393435376434653963653931353031303538396632613062 Sep 13 00:53:14.874000 audit: BPF prog-id=220 op=UNLOAD Sep 13 00:53:14.875000 audit: BPF prog-id=219 op=UNLOAD Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { perfmon } for pid=5350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit[5350]: AVC avc: denied { bpf } for pid=5350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:14.875000 audit: BPF prog-id=221 op=LOAD Sep 13 00:53:14.875000 audit[5350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003c2c68 items=0 ppid=4393 pid=5350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:14.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323735393435376434653963653931353031303538396632613062 Sep 13 00:53:14.907818 env[1460]: time="2025-09-13T00:53:14.907759882Z" level=info msg="StartContainer for \"dc2759457d4e9ce915010589f2a0b9e07a0fe82f80f65972381eafafe87e230b\" returns successfully" Sep 13 00:53:15.236000 audit[5382]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:15.236000 audit[5382]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffedf5ac950 a2=0 a3=7ffedf5ac93c items=0 ppid=2605 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:15.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:15.241000 audit[5382]: NETFILTER_CFG table=nat:123 family=2 entries=32 op=nft_register_rule pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:15.241000 audit[5382]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffedf5ac950 a2=0 a3=7ffedf5ac93c items=0 ppid=2605 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:15.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:15.325652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3462264419.mount: Deactivated successfully. Sep 13 00:53:16.202800 kubelet[2459]: I0913 00:53:16.202741 2459 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:16.390000 audit[5361]: AVC avc: denied { watch } for pid=5361 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.3769461532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c495 tclass=file permissive=0 Sep 13 00:53:16.390000 audit[5361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000acd080 a2=fc6 a3=0 items=0 ppid=4393 pid=5361 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 key=(null) Sep 13 00:53:16.390000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:53:17.610494 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2167280566.mount: Deactivated successfully. Sep 13 00:53:18.456869 env[1460]: time="2025-09-13T00:53:18.456821023Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.461763 env[1460]: time="2025-09-13T00:53:18.461709330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.465119 env[1460]: time="2025-09-13T00:53:18.465074635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.468811 env[1460]: time="2025-09-13T00:53:18.468760740Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:18.469324 env[1460]: time="2025-09-13T00:53:18.469288141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 13 00:53:18.470907 env[1460]: time="2025-09-13T00:53:18.470868144Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:53:18.476862 env[1460]: time="2025-09-13T00:53:18.476833853Z" level=info msg="CreateContainer within sandbox \"0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 13 00:53:18.499209 env[1460]: time="2025-09-13T00:53:18.499156386Z" level=info msg="CreateContainer within sandbox \"0b2cba3f172c9b9ffdfb0b518ac8ee58e97f6b2d3ece18647fdae8f838c25577\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3\"" Sep 13 00:53:18.499809 env[1460]: time="2025-09-13T00:53:18.499782587Z" level=info msg="StartContainer for \"05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3\"" Sep 13 00:53:18.531262 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.UvGw55.mount: Deactivated successfully. Sep 13 00:53:18.538858 systemd[1]: Started cri-containerd-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3.scope. Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.551000 audit: BPF prog-id=222 op=LOAD Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4566 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656662383634376233316630303138653238316532306636396339 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4566 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656662383634376233316630303138653238316532306636396339 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit: BPF prog-id=223 op=LOAD Sep 13 00:53:18.552000 audit[5395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025b10 items=0 ppid=4566 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656662383634376233316630303138653238316532306636396339 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit: BPF prog-id=224 op=LOAD Sep 13 00:53:18.552000 audit[5395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025b58 items=0 ppid=4566 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656662383634376233316630303138653238316532306636396339 Sep 13 00:53:18.552000 audit: BPF prog-id=224 op=UNLOAD Sep 13 00:53:18.552000 audit: BPF prog-id=223 op=UNLOAD Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { perfmon } for pid=5395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit[5395]: AVC avc: denied { bpf } for pid=5395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:18.552000 audit: BPF prog-id=225 op=LOAD Sep 13 00:53:18.552000 audit[5395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025f68 items=0 ppid=4566 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:18.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656662383634376233316630303138653238316532306636396339 Sep 13 00:53:18.589852 env[1460]: time="2025-09-13T00:53:18.589801122Z" level=info msg="StartContainer for \"05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3\" returns successfully" Sep 13 00:53:19.236682 kubelet[2459]: I0913 00:53:19.234546 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5d7c85d74f-wbxlq" podStartSLOduration=38.157677623 podStartE2EDuration="54.234524286s" podCreationTimestamp="2025-09-13 00:52:25 +0000 UTC" firstStartedPulling="2025-09-13 00:52:58.722533249 +0000 UTC m=+49.890550042" lastFinishedPulling="2025-09-13 00:53:14.799379912 +0000 UTC m=+65.967396705" observedRunningTime="2025-09-13 00:53:15.217574966 +0000 UTC m=+66.385591759" watchObservedRunningTime="2025-09-13 00:53:19.234524286 +0000 UTC m=+70.402541179" Sep 13 00:53:19.269000 audit[5441]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:19.269000 audit[5441]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc2d4ac740 a2=0 a3=7ffc2d4ac72c items=0 ppid=2605 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:19.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:19.274000 audit[5441]: NETFILTER_CFG table=nat:125 family=2 entries=24 op=nft_register_rule pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:19.274000 audit[5441]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffc2d4ac740 a2=0 a3=7ffc2d4ac72c items=0 ppid=2605 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:19.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:20.205938 env[1460]: time="2025-09-13T00:53:20.205892724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:20.211325 env[1460]: time="2025-09-13T00:53:20.211290332Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:20.216219 env[1460]: time="2025-09-13T00:53:20.216190540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:20.219834 env[1460]: time="2025-09-13T00:53:20.219807645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:20.220262 env[1460]: time="2025-09-13T00:53:20.220235646Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:53:20.241288 env[1460]: time="2025-09-13T00:53:20.241255176Z" level=info msg="CreateContainer within sandbox \"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:53:20.263848 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.WaoHIh.mount: Deactivated successfully. Sep 13 00:53:20.282248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1898063514.mount: Deactivated successfully. Sep 13 00:53:20.292849 env[1460]: time="2025-09-13T00:53:20.292814152Z" level=info msg="CreateContainer within sandbox \"bdb5587df9e07af33d65c0c9c724398772cb9ca512e64b38ed681f1113850a7c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fb73e4b2cd8add59ac152bff9af8aeff3effd3fd07b8f7a73292fdd431b50112\"" Sep 13 00:53:20.295214 env[1460]: time="2025-09-13T00:53:20.295181756Z" level=info msg="StartContainer for \"fb73e4b2cd8add59ac152bff9af8aeff3effd3fd07b8f7a73292fdd431b50112\"" Sep 13 00:53:20.317270 systemd[1]: Started cri-containerd-fb73e4b2cd8add59ac152bff9af8aeff3effd3fd07b8f7a73292fdd431b50112.scope. Sep 13 00:53:20.364559 kernel: kauditd_printk_skb: 168 callbacks suppressed Sep 13 00:53:20.364710 kernel: audit: type=1400 audit(1757724800.344:1372): avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f16a5c9fde8 items=0 ppid=4348 pid=5471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.390655 kernel: audit: type=1300 audit(1757724800.344:1372): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f16a5c9fde8 items=0 ppid=4348 pid=5471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373365346232636438616464353961633135326266663961663861 Sep 13 00:53:20.435647 kernel: audit: type=1327 audit(1757724800.344:1372): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373365346232636438616464353961633135326266663961663861 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.450832 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.465045 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.466986 env[1460]: time="2025-09-13T00:53:20.466888208Z" level=info msg="StartContainer for \"fb73e4b2cd8add59ac152bff9af8aeff3effd3fd07b8f7a73292fdd431b50112\" returns successfully" Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.480924 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.481003 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.511648 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.511733 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit: BPF prog-id=226 op=LOAD Sep 13 00:53:20.544645 kernel: audit: type=1400 audit(1757724800.344:1373): avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.344000 audit[5471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000300528 items=0 ppid=4348 pid=5471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373365346232636438616464353961633135326266663961663861 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit: BPF prog-id=227 op=LOAD Sep 13 00:53:20.365000 audit[5471]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000300578 items=0 ppid=4348 pid=5471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373365346232636438616464353961633135326266663961663861 Sep 13 00:53:20.365000 audit: BPF prog-id=227 op=UNLOAD Sep 13 00:53:20.365000 audit: BPF prog-id=226 op=UNLOAD Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { perfmon } for pid=5471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit[5471]: AVC avc: denied { bpf } for pid=5471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:20.365000 audit: BPF prog-id=228 op=LOAD Sep 13 00:53:20.365000 audit[5471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000300608 items=0 ppid=4348 pid=5471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:20.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373365346232636438616464353961633135326266663961663861 Sep 13 00:53:21.037077 kubelet[2459]: I0913 00:53:21.037048 2459 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:53:21.037077 kubelet[2459]: I0913 00:53:21.037087 2459 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:53:21.236432 kubelet[2459]: I0913 00:53:21.236331 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-54d579b49d-jb8v5" podStartSLOduration=33.627375463 podStartE2EDuration="52.236312233s" podCreationTimestamp="2025-09-13 00:52:29 +0000 UTC" firstStartedPulling="2025-09-13 00:52:59.861452673 +0000 UTC m=+51.029469566" lastFinishedPulling="2025-09-13 00:53:18.470389443 +0000 UTC m=+69.638406336" observedRunningTime="2025-09-13 00:53:19.23747749 +0000 UTC m=+70.405494283" watchObservedRunningTime="2025-09-13 00:53:21.236312233 +0000 UTC m=+72.404329126" Sep 13 00:53:25.115831 systemd[1]: run-containerd-runc-k8s.io-2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c-runc.o3NOEg.mount: Deactivated successfully. Sep 13 00:53:25.129192 kubelet[2459]: I0913 00:53:25.129155 2459 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:53:25.152993 kubelet[2459]: I0913 00:53:25.152914 2459 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-p988w" podStartSLOduration=34.544375107 podStartE2EDuration="56.152893623s" podCreationTimestamp="2025-09-13 00:52:29 +0000 UTC" firstStartedPulling="2025-09-13 00:52:58.612653831 +0000 UTC m=+49.780670624" lastFinishedPulling="2025-09-13 00:53:20.221172247 +0000 UTC m=+71.389189140" observedRunningTime="2025-09-13 00:53:21.237060335 +0000 UTC m=+72.405077128" watchObservedRunningTime="2025-09-13 00:53:25.152893623 +0000 UTC m=+76.320910516" Sep 13 00:53:25.210000 audit[5533]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=5533 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:25.210000 audit[5533]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe001c6040 a2=0 a3=7ffe001c602c items=0 ppid=2605 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:25.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:25.214000 audit[5533]: NETFILTER_CFG table=nat:127 family=2 entries=36 op=nft_register_chain pid=5533 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:25.214000 audit[5533]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffe001c6040 a2=0 a3=7ffe001c602c items=0 ppid=2605 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:25.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:36.193031 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.j89MvZ.mount: Deactivated successfully. Sep 13 00:53:36.727244 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.kmWiSv.mount: Deactivated successfully. Sep 13 00:53:38.342820 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.6YdUyx.mount: Deactivated successfully. Sep 13 00:53:50.255263 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.P0aUIR.mount: Deactivated successfully. Sep 13 00:53:50.407000 audit[5625]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=5625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:50.414474 kernel: kauditd_printk_skb: 39 callbacks suppressed Sep 13 00:53:50.414575 kernel: audit: type=1325 audit(1757724830.407:1380): table=filter:128 family=2 entries=9 op=nft_register_rule pid=5625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:50.407000 audit[5625]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc8fbf660 a2=0 a3=7fffc8fbf64c items=0 ppid=2605 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:50.456661 kernel: audit: type=1300 audit(1757724830.407:1380): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc8fbf660 a2=0 a3=7fffc8fbf64c items=0 ppid=2605 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:50.456770 kernel: audit: type=1327 audit(1757724830.407:1380): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:50.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:50.451000 audit[5625]: NETFILTER_CFG table=nat:129 family=2 entries=31 op=nft_register_chain pid=5625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:50.479666 kernel: audit: type=1325 audit(1757724830.451:1381): table=nat:129 family=2 entries=31 op=nft_register_chain pid=5625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:50.451000 audit[5625]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fffc8fbf660 a2=0 a3=7fffc8fbf64c items=0 ppid=2605 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:50.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:50.518636 kernel: audit: type=1300 audit(1757724830.451:1381): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fffc8fbf660 a2=0 a3=7fffc8fbf64c items=0 ppid=2605 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:50.518784 kernel: audit: type=1327 audit(1757724830.451:1381): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:55.131529 systemd[1]: run-containerd-runc-k8s.io-2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c-runc.TZOHKd.mount: Deactivated successfully. Sep 13 00:54:02.932000 audit[4808]: AVC avc: denied { watch } for pid=4808 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.2278922063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c559,c771 tclass=file permissive=0 Sep 13 00:54:02.957647 kernel: audit: type=1400 audit(1757724842.932:1382): avc: denied { watch } for pid=4808 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.2278922063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c559,c771 tclass=file permissive=0 Sep 13 00:54:02.932000 audit[4808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001d8b260 a2=fc6 a3=0 items=0 ppid=3920 pid=4808 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 key=(null) Sep 13 00:54:03.020561 kernel: audit: type=1300 audit(1757724842.932:1382): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001d8b260 a2=fc6 a3=0 items=0 ppid=3920 pid=4808 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 key=(null) Sep 13 00:54:03.020801 kernel: audit: type=1327 audit(1757724842.932:1382): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:54:02.932000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:54:05.787000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.787000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.825589 kernel: audit: type=1400 audit(1757724845.787:1383): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.825740 kernel: audit: type=1400 audit(1757724845.787:1384): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.825784 kernel: audit: type=1300 audit(1757724845.787:1384): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00d2c41b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.787000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00d2c41b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.872854 kernel: audit: type=1327 audit(1757724845.787:1384): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.873012 kernel: audit: type=1400 audit(1757724845.787:1385): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.787000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.787000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00d2c4210 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.918487 kernel: audit: type=1300 audit(1757724845.787:1385): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00d2c4210 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.787000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00533caa0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.905000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.905000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00d2c4cc0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.905000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.905000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00697a320 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.905000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:05.905000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00d2c4d50 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:54:05.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:05.941653 kernel: audit: type=1327 audit(1757724845.787:1385): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:54:06.188324 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.GL9Rjp.mount: Deactivated successfully. Sep 13 00:54:06.422000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:06.422000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fa2630 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:06.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:06.422000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:06.422000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b7f5e0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:06.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.465000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.470499 kernel: kauditd_printk_skb: 17 callbacks suppressed Sep 13 00:54:10.470604 kernel: audit: type=1400 audit(1757724850.465:1392): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.465000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.507397 kernel: audit: type=1400 audit(1757724850.465:1391): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.507530 kernel: audit: type=1300 audit(1757724850.465:1392): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7fcc0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.465000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7fcc0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.465000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.571108 kernel: audit: type=1327 audit(1757724850.465:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.571244 kernel: audit: type=1400 audit(1757724850.465:1393): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.571290 kernel: audit: type=1300 audit(1757724850.465:1393): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7fce0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.465000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7fce0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.616314 kernel: audit: type=1327 audit(1757724850.465:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.465000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.465000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7fe80 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.663332 kernel: audit: type=1400 audit(1757724850.465:1394): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:54:10.663477 kernel: audit: type=1300 audit(1757724850.465:1394): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7fe80 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.663508 kernel: audit: type=1327 audit(1757724850.465:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:10.465000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020a3ae0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:54:10.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:54:13.414553 update_engine[1434]: I0913 00:54:13.414513 1434 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 13 00:54:13.414553 update_engine[1434]: I0913 00:54:13.414548 1434 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 13 00:54:13.415020 update_engine[1434]: I0913 00:54:13.414695 1434 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 13 00:54:13.415174 update_engine[1434]: I0913 00:54:13.415149 1434 omaha_request_params.cc:62] Current group set to lts Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415304 1434 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415315 1434 update_attempter.cc:643] Scheduling an action processor start. Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415334 1434 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415364 1434 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415429 1434 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415436 1434 omaha_request_action.cc:271] Request: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: Sep 13 00:54:13.415492 update_engine[1434]: I0913 00:54:13.415442 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:54:13.416042 locksmithd[1524]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 13 00:54:13.489201 update_engine[1434]: I0913 00:54:13.489166 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:54:13.489440 update_engine[1434]: I0913 00:54:13.489419 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:54:13.515399 update_engine[1434]: E0913 00:54:13.515359 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:54:13.515534 update_engine[1434]: I0913 00:54:13.515475 1434 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 13 00:54:16.391000 audit[5361]: AVC avc: denied { watch } for pid=5361 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.3769461532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c495 tclass=file permissive=0 Sep 13 00:54:16.397120 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 00:54:16.397244 kernel: audit: type=1400 audit(1757724856.391:1395): avc: denied { watch } for pid=5361 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.3769461532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c495 tclass=file permissive=0 Sep 13 00:54:16.391000 audit[5361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0012e8020 a2=fc6 a3=0 items=0 ppid=4393 pid=5361 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 key=(null) Sep 13 00:54:16.444496 kernel: audit: type=1300 audit(1757724856.391:1395): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0012e8020 a2=fc6 a3=0 items=0 ppid=4393 pid=5361 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 key=(null) Sep 13 00:54:16.444647 kernel: audit: type=1327 audit(1757724856.391:1395): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:54:16.391000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:54:23.372707 update_engine[1434]: I0913 00:54:23.372666 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:54:23.373116 update_engine[1434]: I0913 00:54:23.372915 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:54:23.373164 update_engine[1434]: I0913 00:54:23.373117 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:54:23.437130 update_engine[1434]: E0913 00:54:23.437088 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:54:23.437344 update_engine[1434]: I0913 00:54:23.437219 1434 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Sep 13 00:54:33.372853 update_engine[1434]: I0913 00:54:33.372800 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:54:33.373249 update_engine[1434]: I0913 00:54:33.373052 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:54:33.373311 update_engine[1434]: I0913 00:54:33.373288 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:54:33.386759 update_engine[1434]: E0913 00:54:33.386732 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:54:33.386875 update_engine[1434]: I0913 00:54:33.386842 1434 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Sep 13 00:54:36.178271 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.rxe4Tg.mount: Deactivated successfully. Sep 13 00:54:36.722207 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.v3C2Xt.mount: Deactivated successfully. Sep 13 00:54:38.339231 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.BOoXmH.mount: Deactivated successfully. Sep 13 00:54:43.372864 update_engine[1434]: I0913 00:54:43.372828 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:54:43.373242 update_engine[1434]: I0913 00:54:43.373054 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:54:43.373293 update_engine[1434]: I0913 00:54:43.373243 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:54:43.387388 update_engine[1434]: E0913 00:54:43.387355 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:54:43.387535 update_engine[1434]: I0913 00:54:43.387472 1434 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 13 00:54:43.387535 update_engine[1434]: I0913 00:54:43.387481 1434 omaha_request_action.cc:621] Omaha request response: Sep 13 00:54:43.387615 update_engine[1434]: E0913 00:54:43.387560 1434 omaha_request_action.cc:640] Omaha request network transfer failed. Sep 13 00:54:43.387615 update_engine[1434]: I0913 00:54:43.387574 1434 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Sep 13 00:54:43.387615 update_engine[1434]: I0913 00:54:43.387578 1434 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 00:54:43.387615 update_engine[1434]: I0913 00:54:43.387583 1434 update_attempter.cc:306] Processing Done. Sep 13 00:54:43.387615 update_engine[1434]: E0913 00:54:43.387598 1434 update_attempter.cc:619] Update failed. Sep 13 00:54:43.387615 update_engine[1434]: I0913 00:54:43.387602 1434 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Sep 13 00:54:43.387615 update_engine[1434]: I0913 00:54:43.387607 1434 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Sep 13 00:54:43.387615 update_engine[1434]: I0913 00:54:43.387612 1434 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Sep 13 00:54:43.387913 update_engine[1434]: I0913 00:54:43.387702 1434 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 13 00:54:43.387913 update_engine[1434]: I0913 00:54:43.387727 1434 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 13 00:54:43.387913 update_engine[1434]: I0913 00:54:43.387732 1434 omaha_request_action.cc:271] Request: Sep 13 00:54:43.387913 update_engine[1434]: Sep 13 00:54:43.387913 update_engine[1434]: Sep 13 00:54:43.387913 update_engine[1434]: Sep 13 00:54:43.387913 update_engine[1434]: Sep 13 00:54:43.387913 update_engine[1434]: Sep 13 00:54:43.387913 update_engine[1434]: Sep 13 00:54:43.387913 update_engine[1434]: I0913 00:54:43.387737 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:54:43.387913 update_engine[1434]: I0913 00:54:43.387910 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:54:43.388259 update_engine[1434]: I0913 00:54:43.388073 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:54:43.388391 locksmithd[1524]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Sep 13 00:54:43.401188 update_engine[1434]: E0913 00:54:43.401150 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401259 1434 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401268 1434 omaha_request_action.cc:621] Omaha request response: Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401274 1434 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401279 1434 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401283 1434 update_attempter.cc:306] Processing Done. Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401289 1434 update_attempter.cc:310] Error event sent. Sep 13 00:54:43.401339 update_engine[1434]: I0913 00:54:43.401300 1434 update_check_scheduler.cc:74] Next update check in 41m38s Sep 13 00:54:43.401803 locksmithd[1524]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Sep 13 00:54:50.243437 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.DxYPKj.mount: Deactivated successfully. Sep 13 00:55:01.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.44:22-10.200.16.10:42278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.631695 systemd[1]: Started sshd@7-10.200.4.44:22-10.200.16.10:42278.service. Sep 13 00:55:01.652755 kernel: audit: type=1130 audit(1757724901.631:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.44:22-10.200.16.10:42278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:02.215000 audit[5849]: USER_ACCT pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.218003 sshd[5849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:02.237922 kernel: audit: type=1101 audit(1757724902.215:1397): pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.237967 sshd[5849]: Accepted publickey for core from 10.200.16.10 port 42278 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:02.215000 audit[5849]: CRED_ACQ pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.243269 systemd[1]: Started session-10.scope. Sep 13 00:55:02.243688 systemd-logind[1433]: New session 10 of user core. Sep 13 00:55:02.258719 kernel: audit: type=1103 audit(1757724902.215:1398): pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.258844 kernel: audit: type=1006 audit(1757724902.215:1399): pid=5849 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 13 00:55:02.215000 audit[5849]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1c4e080 a2=3 a3=0 items=0 ppid=1 pid=5849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:02.290792 kernel: audit: type=1300 audit(1757724902.215:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1c4e080 a2=3 a3=0 items=0 ppid=1 pid=5849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:02.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:02.291681 kernel: audit: type=1327 audit(1757724902.215:1399): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:02.248000 audit[5849]: USER_START pid=5849 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.319390 kernel: audit: type=1105 audit(1757724902.248:1400): pid=5849 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.319920 kernel: audit: type=1103 audit(1757724902.248:1401): pid=5851 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.248000 audit[5851]: CRED_ACQ pid=5851 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.711897 sshd[5849]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:02.712000 audit[5849]: USER_END pid=5849 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.718167 systemd[1]: sshd@7-10.200.4.44:22-10.200.16.10:42278.service: Deactivated successfully. Sep 13 00:55:02.719120 systemd[1]: session-10.scope: Deactivated successfully. Sep 13 00:55:02.726036 systemd-logind[1433]: Session 10 logged out. Waiting for processes to exit. Sep 13 00:55:02.727224 systemd-logind[1433]: Removed session 10. Sep 13 00:55:02.715000 audit[5849]: CRED_DISP pid=5849 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.757035 kernel: audit: type=1106 audit(1757724902.712:1402): pid=5849 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.757184 kernel: audit: type=1104 audit(1757724902.715:1403): pid=5849 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:02.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.44:22-10.200.16.10:42278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:03.002000 audit[4808]: AVC avc: denied { watch } for pid=4808 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.2278922063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c559,c771 tclass=file permissive=0 Sep 13 00:55:03.002000 audit[4808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002052d20 a2=fc6 a3=0 items=0 ppid=3920 pid=4808 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 key=(null) Sep 13 00:55:03.002000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:55:05.788000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:05.788000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a74c1b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:55:05.788000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:05.789000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:05.789000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a979770 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:55:05.789000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:05.793000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:05.793000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0047a8a80 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:55:05.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:05.908000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:05.908000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a884e10 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:55:05.908000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:05.908000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:05.908000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0052045c0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:55:05.908000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:05.913000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:05.913000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a884fc0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:55:05.913000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:55:06.186855 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.U3dFAh.mount: Deactivated successfully. Sep 13 00:55:06.426000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:06.426000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:06.426000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00172be90 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:55:06.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:06.426000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c86680 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:55:06.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:07.819674 systemd[1]: Started sshd@8-10.200.4.44:22-10.200.16.10:42292.service. Sep 13 00:55:07.845136 kernel: kauditd_printk_skb: 28 callbacks suppressed Sep 13 00:55:07.845286 kernel: audit: type=1130 audit(1757724907.819:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.44:22-10.200.16.10:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:07.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.44:22-10.200.16.10:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:08.409000 audit[5882]: USER_ACCT pid=5882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.431684 kernel: audit: type=1101 audit(1757724908.409:1415): pid=5882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.412204 sshd[5882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:08.432121 sshd[5882]: Accepted publickey for core from 10.200.16.10 port 42292 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:08.411000 audit[5882]: CRED_ACQ pid=5882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.438050 systemd[1]: Started session-11.scope. Sep 13 00:55:08.439102 systemd-logind[1433]: New session 11 of user core. Sep 13 00:55:08.453669 kernel: audit: type=1103 audit(1757724908.411:1416): pid=5882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.453780 kernel: audit: type=1006 audit(1757724908.411:1417): pid=5882 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Sep 13 00:55:08.411000 audit[5882]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1dba13a0 a2=3 a3=0 items=0 ppid=1 pid=5882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.411000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:08.484655 kernel: audit: type=1300 audit(1757724908.411:1417): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1dba13a0 a2=3 a3=0 items=0 ppid=1 pid=5882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.484698 kernel: audit: type=1327 audit(1757724908.411:1417): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:08.444000 audit[5882]: USER_START pid=5882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.491665 kernel: audit: type=1105 audit(1757724908.444:1418): pid=5882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.448000 audit[5884]: CRED_ACQ pid=5884 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.529404 kernel: audit: type=1103 audit(1757724908.448:1419): pid=5884 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.889856 sshd[5882]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:08.890000 audit[5882]: USER_END pid=5882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.892805 systemd[1]: sshd@8-10.200.4.44:22-10.200.16.10:42292.service: Deactivated successfully. Sep 13 00:55:08.894421 systemd[1]: session-11.scope: Deactivated successfully. Sep 13 00:55:08.905427 systemd-logind[1433]: Session 11 logged out. Waiting for processes to exit. Sep 13 00:55:08.906482 systemd-logind[1433]: Removed session 11. Sep 13 00:55:08.890000 audit[5882]: CRED_DISP pid=5882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.931509 kernel: audit: type=1106 audit(1757724908.890:1420): pid=5882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.931621 kernel: audit: type=1104 audit(1757724908.890:1421): pid=5882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:08.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.44:22-10.200.16.10:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:10.466000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:10.466000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:10.466000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c869a0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:55:10.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:10.466000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d9df20 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:55:10.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:10.467000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:10.467000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d9df40 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:55:10.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:10.467000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:55:10.467000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f7c0e0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:55:10.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:55:14.015294 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:55:14.015464 kernel: audit: type=1130 audit(1757724913.989:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.44:22-10.200.16.10:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:13.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.44:22-10.200.16.10:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:13.990150 systemd[1]: Started sshd@9-10.200.4.44:22-10.200.16.10:51700.service. Sep 13 00:55:14.581000 audit[5898]: USER_ACCT pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.583692 sshd[5898]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:14.603945 kernel: audit: type=1101 audit(1757724914.581:1428): pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.603989 sshd[5898]: Accepted publickey for core from 10.200.16.10 port 51700 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:14.582000 audit[5898]: CRED_ACQ pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.609917 systemd[1]: Started session-12.scope. Sep 13 00:55:14.611404 systemd-logind[1433]: New session 12 of user core. Sep 13 00:55:14.637241 kernel: audit: type=1103 audit(1757724914.582:1429): pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.637390 kernel: audit: type=1006 audit(1757724914.582:1430): pid=5898 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 13 00:55:14.637423 kernel: audit: type=1300 audit(1757724914.582:1430): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4dac6820 a2=3 a3=0 items=0 ppid=1 pid=5898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:14.582000 audit[5898]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4dac6820 a2=3 a3=0 items=0 ppid=1 pid=5898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:14.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:14.665583 kernel: audit: type=1327 audit(1757724914.582:1430): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:14.665883 kernel: audit: type=1105 audit(1757724914.616:1431): pid=5898 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.616000 audit[5898]: USER_START pid=5898 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.618000 audit[5900]: CRED_ACQ pid=5900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:14.706832 kernel: audit: type=1103 audit(1757724914.618:1432): pid=5900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.072127 sshd[5898]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:15.072000 audit[5898]: USER_END pid=5898 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.083028 systemd[1]: sshd@9-10.200.4.44:22-10.200.16.10:51700.service: Deactivated successfully. Sep 13 00:55:15.083889 systemd[1]: session-12.scope: Deactivated successfully. Sep 13 00:55:15.085316 systemd-logind[1433]: Session 12 logged out. Waiting for processes to exit. Sep 13 00:55:15.086327 systemd-logind[1433]: Removed session 12. Sep 13 00:55:15.072000 audit[5898]: CRED_DISP pid=5898 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.113656 kernel: audit: type=1106 audit(1757724915.072:1433): pid=5898 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.113763 kernel: audit: type=1104 audit(1757724915.072:1434): pid=5898 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:15.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.44:22-10.200.16.10:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:16.392000 audit[5361]: AVC avc: denied { watch } for pid=5361 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.3769461532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c495 tclass=file permissive=0 Sep 13 00:55:16.392000 audit[5361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014b61e0 a2=fc6 a3=0 items=0 ppid=4393 pid=5361 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 key=(null) Sep 13 00:55:16.392000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:55:20.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.44:22-10.200.16.10:58744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.186248 systemd[1]: Started sshd@10-10.200.4.44:22-10.200.16.10:58744.service. Sep 13 00:55:20.211117 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:55:20.211251 kernel: audit: type=1130 audit(1757724920.185:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.44:22-10.200.16.10:58744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:20.243108 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.E0wDCa.mount: Deactivated successfully. Sep 13 00:55:20.956000 audit[5912]: USER_ACCT pid=5912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.978347 sshd[5912]: Accepted publickey for core from 10.200.16.10 port 58744 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:20.978695 kernel: audit: type=1101 audit(1757724920.956:1438): pid=5912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.978000 audit[5912]: CRED_ACQ pid=5912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.979368 sshd[5912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:20.989223 systemd[1]: Started session-13.scope. Sep 13 00:55:20.990894 systemd-logind[1433]: New session 13 of user core. Sep 13 00:55:21.012351 kernel: audit: type=1103 audit(1757724920.978:1439): pid=5912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.012485 kernel: audit: type=1006 audit(1757724920.978:1440): pid=5912 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Sep 13 00:55:21.012514 kernel: audit: type=1300 audit(1757724920.978:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec43ab040 a2=3 a3=0 items=0 ppid=1 pid=5912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:20.978000 audit[5912]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec43ab040 a2=3 a3=0 items=0 ppid=1 pid=5912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:20.978000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:20.993000 audit[5912]: USER_START pid=5912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.063490 kernel: audit: type=1327 audit(1757724920.978:1440): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:21.063639 kernel: audit: type=1105 audit(1757724920.993:1441): pid=5912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:20.993000 audit[5933]: CRED_ACQ pid=5933 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.083695 kernel: audit: type=1103 audit(1757724920.993:1442): pid=5933 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.462276 sshd[5912]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:21.462000 audit[5912]: USER_END pid=5912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.463000 audit[5912]: CRED_DISP pid=5912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.465328 systemd-logind[1433]: Session 13 logged out. Waiting for processes to exit. Sep 13 00:55:21.466775 systemd[1]: sshd@10-10.200.4.44:22-10.200.16.10:58744.service: Deactivated successfully. Sep 13 00:55:21.467478 systemd[1]: session-13.scope: Deactivated successfully. Sep 13 00:55:21.468869 systemd-logind[1433]: Removed session 13. Sep 13 00:55:21.508152 kernel: audit: type=1106 audit(1757724921.462:1443): pid=5912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.508310 kernel: audit: type=1104 audit(1757724921.463:1444): pid=5912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:21.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.44:22-10.200.16.10:58744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:21.563337 systemd[1]: Started sshd@11-10.200.4.44:22-10.200.16.10:58754.service. Sep 13 00:55:21.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.44:22-10.200.16.10:58754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:22.168000 audit[5944]: USER_ACCT pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:22.169534 sshd[5944]: Accepted publickey for core from 10.200.16.10 port 58754 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:22.169000 audit[5944]: CRED_ACQ pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:22.169000 audit[5944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc95734ba0 a2=3 a3=0 items=0 ppid=1 pid=5944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:22.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:22.170862 sshd[5944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:22.175504 systemd[1]: Started session-14.scope. Sep 13 00:55:22.175932 systemd-logind[1433]: New session 14 of user core. Sep 13 00:55:22.179000 audit[5944]: USER_START pid=5944 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:22.181000 audit[5946]: CRED_ACQ pid=5946 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:22.677985 sshd[5944]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:22.678000 audit[5944]: USER_END pid=5944 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:22.678000 audit[5944]: CRED_DISP pid=5944 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:22.680594 systemd[1]: sshd@11-10.200.4.44:22-10.200.16.10:58754.service: Deactivated successfully. Sep 13 00:55:22.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.44:22-10.200.16.10:58754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:22.681566 systemd[1]: session-14.scope: Deactivated successfully. Sep 13 00:55:22.682291 systemd-logind[1433]: Session 14 logged out. Waiting for processes to exit. Sep 13 00:55:22.683119 systemd-logind[1433]: Removed session 14. Sep 13 00:55:22.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.44:22-10.200.16.10:58764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:22.791313 systemd[1]: Started sshd@12-10.200.4.44:22-10.200.16.10:58764.service. Sep 13 00:55:23.375000 audit[5954]: USER_ACCT pid=5954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:23.375921 sshd[5954]: Accepted publickey for core from 10.200.16.10 port 58764 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:23.376000 audit[5954]: CRED_ACQ pid=5954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:23.376000 audit[5954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff42c6f2b0 a2=3 a3=0 items=0 ppid=1 pid=5954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:23.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:23.377241 sshd[5954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:23.381969 systemd-logind[1433]: New session 15 of user core. Sep 13 00:55:23.382430 systemd[1]: Started session-15.scope. Sep 13 00:55:23.386000 audit[5954]: USER_START pid=5954 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:23.388000 audit[5956]: CRED_ACQ pid=5956 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:23.852402 sshd[5954]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:23.853000 audit[5954]: USER_END pid=5954 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:23.853000 audit[5954]: CRED_DISP pid=5954 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:23.855046 systemd[1]: sshd@12-10.200.4.44:22-10.200.16.10:58764.service: Deactivated successfully. Sep 13 00:55:23.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.44:22-10.200.16.10:58764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:23.855974 systemd[1]: session-15.scope: Deactivated successfully. Sep 13 00:55:23.856620 systemd-logind[1433]: Session 15 logged out. Waiting for processes to exit. Sep 13 00:55:23.857454 systemd-logind[1433]: Removed session 15. Sep 13 00:55:28.954713 systemd[1]: Started sshd@13-10.200.4.44:22-10.200.16.10:58776.service. Sep 13 00:55:28.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.44:22-10.200.16.10:58776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:28.970531 kernel: kauditd_printk_skb: 23 callbacks suppressed Sep 13 00:55:28.970675 kernel: audit: type=1130 audit(1757724928.954:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.44:22-10.200.16.10:58776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:29.549000 audit[5989]: USER_ACCT pid=5989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.571170 sshd[5989]: Accepted publickey for core from 10.200.16.10 port 58776 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:29.570000 audit[5989]: CRED_ACQ pid=5989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.571694 sshd[5989]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:29.577920 systemd[1]: Started session-16.scope. Sep 13 00:55:29.579231 systemd-logind[1433]: New session 16 of user core. Sep 13 00:55:29.591655 kernel: audit: type=1101 audit(1757724929.549:1465): pid=5989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.591779 kernel: audit: type=1103 audit(1757724929.570:1466): pid=5989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.591806 kernel: audit: type=1006 audit(1757724929.570:1467): pid=5989 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Sep 13 00:55:29.570000 audit[5989]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7e37c780 a2=3 a3=0 items=0 ppid=1 pid=5989 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:29.623465 kernel: audit: type=1300 audit(1757724929.570:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7e37c780 a2=3 a3=0 items=0 ppid=1 pid=5989 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:29.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:29.631686 kernel: audit: type=1327 audit(1757724929.570:1467): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:29.584000 audit[5989]: USER_START pid=5989 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.586000 audit[5992]: CRED_ACQ pid=5992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.678923 kernel: audit: type=1105 audit(1757724929.584:1468): pid=5989 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:29.679074 kernel: audit: type=1103 audit(1757724929.586:1469): pid=5992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:30.047609 sshd[5989]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:30.048000 audit[5989]: USER_END pid=5989 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:30.050568 systemd[1]: sshd@13-10.200.4.44:22-10.200.16.10:58776.service: Deactivated successfully. Sep 13 00:55:30.051367 systemd[1]: session-16.scope: Deactivated successfully. Sep 13 00:55:30.055904 systemd-logind[1433]: Session 16 logged out. Waiting for processes to exit. Sep 13 00:55:30.056860 systemd-logind[1433]: Removed session 16. Sep 13 00:55:30.048000 audit[5989]: CRED_DISP pid=5989 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:30.072653 kernel: audit: type=1106 audit(1757724930.048:1470): pid=5989 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:30.072726 kernel: audit: type=1104 audit(1757724930.048:1471): pid=5989 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:30.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.44:22-10.200.16.10:58776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:35.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.44:22-10.200.16.10:33530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:35.160015 systemd[1]: Started sshd@14-10.200.4.44:22-10.200.16.10:33530.service. Sep 13 00:55:35.165422 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:55:35.165494 kernel: audit: type=1130 audit(1757724935.159:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.44:22-10.200.16.10:33530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:35.755000 audit[6002]: USER_ACCT pid=6002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.780027 sshd[6002]: Accepted publickey for core from 10.200.16.10 port 33530 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:35.780730 kernel: audit: type=1101 audit(1757724935.755:1474): pid=6002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.780794 sshd[6002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:35.779000 audit[6002]: CRED_ACQ pid=6002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.787978 systemd-logind[1433]: New session 17 of user core. Sep 13 00:55:35.788662 systemd[1]: Started session-17.scope. Sep 13 00:55:35.805851 kernel: audit: type=1103 audit(1757724935.779:1475): pid=6002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.805956 kernel: audit: type=1006 audit(1757724935.779:1476): pid=6002 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 13 00:55:35.779000 audit[6002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe07f09650 a2=3 a3=0 items=0 ppid=1 pid=6002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:35.841699 kernel: audit: type=1300 audit(1757724935.779:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe07f09650 a2=3 a3=0 items=0 ppid=1 pid=6002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:35.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:35.814000 audit[6002]: USER_START pid=6002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.874316 kernel: audit: type=1327 audit(1757724935.779:1476): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:35.874452 kernel: audit: type=1105 audit(1757724935.814:1477): pid=6002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.816000 audit[6004]: CRED_ACQ pid=6004 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:35.894662 kernel: audit: type=1103 audit(1757724935.816:1478): pid=6004 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:36.202789 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.7vhFXK.mount: Deactivated successfully. Sep 13 00:55:36.311126 sshd[6002]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:36.311000 audit[6002]: USER_END pid=6002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:36.313958 systemd-logind[1433]: Session 17 logged out. Waiting for processes to exit. Sep 13 00:55:36.315087 systemd[1]: sshd@14-10.200.4.44:22-10.200.16.10:33530.service: Deactivated successfully. Sep 13 00:55:36.315791 systemd[1]: session-17.scope: Deactivated successfully. Sep 13 00:55:36.316849 systemd-logind[1433]: Removed session 17. Sep 13 00:55:36.334661 kernel: audit: type=1106 audit(1757724936.311:1479): pid=6002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:36.311000 audit[6002]: CRED_DISP pid=6002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:36.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.44:22-10.200.16.10:33530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:36.354041 kernel: audit: type=1104 audit(1757724936.311:1480): pid=6002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:36.722100 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.h3fjrt.mount: Deactivated successfully. Sep 13 00:55:38.338984 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.vXvSfl.mount: Deactivated successfully. Sep 13 00:55:41.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.44:22-10.200.16.10:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:41.408137 systemd[1]: Started sshd@15-10.200.4.44:22-10.200.16.10:33056.service. Sep 13 00:55:41.414464 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:55:41.414566 kernel: audit: type=1130 audit(1757724941.407:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.44:22-10.200.16.10:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:41.993000 audit[6081]: USER_ACCT pid=6081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:41.994551 sshd[6081]: Accepted publickey for core from 10.200.16.10 port 33056 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:42.015922 kernel: audit: type=1101 audit(1757724941.993:1483): pid=6081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.016720 sshd[6081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:42.015000 audit[6081]: CRED_ACQ pid=6081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.028207 systemd-logind[1433]: New session 18 of user core. Sep 13 00:55:42.029404 systemd[1]: Started session-18.scope. Sep 13 00:55:42.039342 kernel: audit: type=1103 audit(1757724942.015:1484): pid=6081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.039416 kernel: audit: type=1006 audit(1757724942.015:1485): pid=6081 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Sep 13 00:55:42.015000 audit[6081]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6961b260 a2=3 a3=0 items=0 ppid=1 pid=6081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:42.070046 kernel: audit: type=1300 audit(1757724942.015:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6961b260 a2=3 a3=0 items=0 ppid=1 pid=6081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:42.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:42.076842 kernel: audit: type=1327 audit(1757724942.015:1485): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:42.076939 kernel: audit: type=1105 audit(1757724942.036:1486): pid=6081 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.036000 audit[6081]: USER_START pid=6081 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.037000 audit[6084]: CRED_ACQ pid=6084 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.115550 kernel: audit: type=1103 audit(1757724942.037:1487): pid=6084 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.477267 sshd[6081]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:42.478000 audit[6081]: USER_END pid=6081 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.480513 systemd[1]: sshd@15-10.200.4.44:22-10.200.16.10:33056.service: Deactivated successfully. Sep 13 00:55:42.481352 systemd[1]: session-18.scope: Deactivated successfully. Sep 13 00:55:42.483002 systemd-logind[1433]: Session 18 logged out. Waiting for processes to exit. Sep 13 00:55:42.484105 systemd-logind[1433]: Removed session 18. Sep 13 00:55:42.478000 audit[6081]: CRED_DISP pid=6081 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.500655 kernel: audit: type=1106 audit(1757724942.478:1488): pid=6081 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.500721 kernel: audit: type=1104 audit(1757724942.478:1489): pid=6081 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:42.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.44:22-10.200.16.10:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:47.602433 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:55:47.602573 kernel: audit: type=1130 audit(1757724947.577:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.44:22-10.200.16.10:33066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:47.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.44:22-10.200.16.10:33066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:47.577460 systemd[1]: Started sshd@16-10.200.4.44:22-10.200.16.10:33066.service. Sep 13 00:55:48.168000 audit[6096]: USER_ACCT pid=6096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.190607 sshd[6096]: Accepted publickey for core from 10.200.16.10 port 33066 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:48.190929 kernel: audit: type=1101 audit(1757724948.168:1492): pid=6096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.191092 sshd[6096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:48.189000 audit[6096]: CRED_ACQ pid=6096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.203082 systemd[1]: Started session-19.scope. Sep 13 00:55:48.204665 systemd-logind[1433]: New session 19 of user core. Sep 13 00:55:48.213652 kernel: audit: type=1103 audit(1757724948.189:1493): pid=6096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.190000 audit[6096]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec553e430 a2=3 a3=0 items=0 ppid=1 pid=6096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:48.232734 kernel: audit: type=1006 audit(1757724948.190:1494): pid=6096 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Sep 13 00:55:48.232790 kernel: audit: type=1300 audit(1757724948.190:1494): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec553e430 a2=3 a3=0 items=0 ppid=1 pid=6096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:48.190000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:48.252701 kernel: audit: type=1327 audit(1757724948.190:1494): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:48.215000 audit[6096]: USER_START pid=6096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.217000 audit[6101]: CRED_ACQ pid=6101 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.282877 kernel: audit: type=1105 audit(1757724948.215:1495): pid=6096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.282938 kernel: audit: type=1103 audit(1757724948.217:1496): pid=6101 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.675654 sshd[6096]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:48.676000 audit[6096]: USER_END pid=6096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.678870 systemd-logind[1433]: Session 19 logged out. Waiting for processes to exit. Sep 13 00:55:48.680370 systemd[1]: sshd@16-10.200.4.44:22-10.200.16.10:33066.service: Deactivated successfully. Sep 13 00:55:48.681204 systemd[1]: session-19.scope: Deactivated successfully. Sep 13 00:55:48.682902 systemd-logind[1433]: Removed session 19. Sep 13 00:55:48.676000 audit[6096]: CRED_DISP pid=6096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.717969 kernel: audit: type=1106 audit(1757724948.676:1497): pid=6096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.718092 kernel: audit: type=1104 audit(1757724948.676:1498): pid=6096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:48.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.44:22-10.200.16.10:33066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:48.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.44:22-10.200.16.10:33068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:48.773961 systemd[1]: Started sshd@17-10.200.4.44:22-10.200.16.10:33068.service. Sep 13 00:55:49.356000 audit[6112]: USER_ACCT pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:49.357161 sshd[6112]: Accepted publickey for core from 10.200.16.10 port 33068 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:49.357000 audit[6112]: CRED_ACQ pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:49.357000 audit[6112]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2890b770 a2=3 a3=0 items=0 ppid=1 pid=6112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:49.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:49.358571 sshd[6112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:49.363509 systemd-logind[1433]: New session 20 of user core. Sep 13 00:55:49.364105 systemd[1]: Started session-20.scope. Sep 13 00:55:49.368000 audit[6112]: USER_START pid=6112 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:49.370000 audit[6114]: CRED_ACQ pid=6114 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:49.869024 sshd[6112]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:49.869000 audit[6112]: USER_END pid=6112 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:49.869000 audit[6112]: CRED_DISP pid=6112 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:49.871736 systemd[1]: sshd@17-10.200.4.44:22-10.200.16.10:33068.service: Deactivated successfully. Sep 13 00:55:49.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.44:22-10.200.16.10:33068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:49.872644 systemd[1]: session-20.scope: Deactivated successfully. Sep 13 00:55:49.873255 systemd-logind[1433]: Session 20 logged out. Waiting for processes to exit. Sep 13 00:55:49.873967 systemd-logind[1433]: Removed session 20. Sep 13 00:55:49.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.44:22-10.200.16.10:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:49.968333 systemd[1]: Started sshd@18-10.200.4.44:22-10.200.16.10:48718.service. Sep 13 00:55:50.245981 systemd[1]: run-containerd-runc-k8s.io-05efb8647b31f0018e281e20f69c9da8a2654157bea2276ef041a5aeb6ac61d3-runc.HWA0Hi.mount: Deactivated successfully. Sep 13 00:55:50.554000 audit[6123]: USER_ACCT pid=6123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:50.555813 sshd[6123]: Accepted publickey for core from 10.200.16.10 port 48718 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:50.556000 audit[6123]: CRED_ACQ pid=6123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:50.556000 audit[6123]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed2cbaa90 a2=3 a3=0 items=0 ppid=1 pid=6123 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:50.556000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:50.557307 sshd[6123]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:50.561990 systemd-logind[1433]: New session 21 of user core. Sep 13 00:55:50.562475 systemd[1]: Started session-21.scope. Sep 13 00:55:50.566000 audit[6123]: USER_START pid=6123 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:50.568000 audit[6148]: CRED_ACQ pid=6148 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:51.299000 audit[6158]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=6158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.299000 audit[6158]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcd29f2bb0 a2=0 a3=7ffcd29f2b9c items=0 ppid=2605 pid=6158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.304000 audit[6158]: NETFILTER_CFG table=nat:131 family=2 entries=26 op=nft_register_rule pid=6158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.304000 audit[6158]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffcd29f2bb0 a2=0 a3=0 items=0 ppid=2605 pid=6158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.329000 audit[6160]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=6160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.329000 audit[6160]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffeb2decf90 a2=0 a3=7ffeb2decf7c items=0 ppid=2605 pid=6160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.333000 audit[6160]: NETFILTER_CFG table=nat:133 family=2 entries=26 op=nft_register_rule pid=6160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.333000 audit[6160]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffeb2decf90 a2=0 a3=0 items=0 ppid=2605 pid=6160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.399114 sshd[6123]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:51.399000 audit[6123]: USER_END pid=6123 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:51.400000 audit[6123]: CRED_DISP pid=6123 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:51.402001 systemd[1]: sshd@18-10.200.4.44:22-10.200.16.10:48718.service: Deactivated successfully. Sep 13 00:55:51.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.44:22-10.200.16.10:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:51.402886 systemd[1]: session-21.scope: Deactivated successfully. Sep 13 00:55:51.403542 systemd-logind[1433]: Session 21 logged out. Waiting for processes to exit. Sep 13 00:55:51.404366 systemd-logind[1433]: Removed session 21. Sep 13 00:55:51.498203 systemd[1]: Started sshd@19-10.200.4.44:22-10.200.16.10:48720.service. Sep 13 00:55:51.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.44:22-10.200.16.10:48720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:52.087000 audit[6163]: USER_ACCT pid=6163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.088130 sshd[6163]: Accepted publickey for core from 10.200.16.10 port 48720 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:52.088000 audit[6163]: CRED_ACQ pid=6163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.088000 audit[6163]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa7512790 a2=3 a3=0 items=0 ppid=1 pid=6163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:52.088000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:52.089429 sshd[6163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:52.093998 systemd-logind[1433]: New session 22 of user core. Sep 13 00:55:52.094573 systemd[1]: Started session-22.scope. Sep 13 00:55:52.099000 audit[6163]: USER_START pid=6163 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.100000 audit[6165]: CRED_ACQ pid=6165 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.678237 sshd[6163]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:52.684965 kernel: kauditd_printk_skb: 43 callbacks suppressed Sep 13 00:55:52.685034 kernel: audit: type=1106 audit(1757724952.679:1528): pid=6163 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.679000 audit[6163]: USER_END pid=6163 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.681366 systemd[1]: sshd@19-10.200.4.44:22-10.200.16.10:48720.service: Deactivated successfully. Sep 13 00:55:52.682179 systemd[1]: session-22.scope: Deactivated successfully. Sep 13 00:55:52.683373 systemd-logind[1433]: Session 22 logged out. Waiting for processes to exit. Sep 13 00:55:52.684246 systemd-logind[1433]: Removed session 22. Sep 13 00:55:52.679000 audit[6163]: CRED_DISP pid=6163 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.725754 kernel: audit: type=1104 audit(1757724952.679:1529): pid=6163 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:52.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.44:22-10.200.16.10:48720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:52.744344 kernel: audit: type=1131 audit(1757724952.679:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.44:22-10.200.16.10:48720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:52.777214 systemd[1]: Started sshd@20-10.200.4.44:22-10.200.16.10:48732.service. Sep 13 00:55:52.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.44:22-10.200.16.10:48732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:52.799700 kernel: audit: type=1130 audit(1757724952.776:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.44:22-10.200.16.10:48732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:53.366000 audit[6172]: USER_ACCT pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.374363 sshd[6172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:53.391070 kernel: audit: type=1101 audit(1757724953.366:1532): pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.391132 sshd[6172]: Accepted publickey for core from 10.200.16.10 port 48732 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:53.373000 audit[6172]: CRED_ACQ pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.396686 systemd[1]: Started session-23.scope. Sep 13 00:55:53.397694 systemd-logind[1433]: New session 23 of user core. Sep 13 00:55:53.413650 kernel: audit: type=1103 audit(1757724953.373:1533): pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.413900 kernel: audit: type=1006 audit(1757724953.373:1534): pid=6172 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Sep 13 00:55:53.373000 audit[6172]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd23f084a0 a2=3 a3=0 items=0 ppid=1 pid=6172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.447239 kernel: audit: type=1300 audit(1757724953.373:1534): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd23f084a0 a2=3 a3=0 items=0 ppid=1 pid=6172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.447687 kernel: audit: type=1327 audit(1757724953.373:1534): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:53.373000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:53.402000 audit[6172]: USER_START pid=6172 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.478409 kernel: audit: type=1105 audit(1757724953.402:1535): pid=6172 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.402000 audit[6174]: CRED_ACQ pid=6174 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.858932 sshd[6172]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:53.859000 audit[6172]: USER_END pid=6172 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.859000 audit[6172]: CRED_DISP pid=6172 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:53.861864 systemd[1]: sshd@20-10.200.4.44:22-10.200.16.10:48732.service: Deactivated successfully. Sep 13 00:55:53.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.44:22-10.200.16.10:48732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:53.862715 systemd[1]: session-23.scope: Deactivated successfully. Sep 13 00:55:53.863490 systemd-logind[1433]: Session 23 logged out. Waiting for processes to exit. Sep 13 00:55:53.864240 systemd-logind[1433]: Removed session 23. Sep 13 00:55:55.114103 systemd[1]: run-containerd-runc-k8s.io-2a37bd369cfbc01541fd350e89efaf554d3d0a52fa32885a9d61f887040ce64c-runc.i43xsc.mount: Deactivated successfully. Sep 13 00:55:58.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.44:22-10.200.16.10:48744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:58.958498 systemd[1]: Started sshd@21-10.200.4.44:22-10.200.16.10:48744.service. Sep 13 00:55:58.964603 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:55:58.964874 kernel: audit: type=1130 audit(1757724958.958:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.44:22-10.200.16.10:48744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:59.543000 audit[6205]: USER_ACCT pid=6205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.544070 sshd[6205]: Accepted publickey for core from 10.200.16.10 port 48744 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:55:59.565657 kernel: audit: type=1101 audit(1757724959.543:1541): pid=6205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.566137 sshd[6205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:55:59.564000 audit[6205]: CRED_ACQ pid=6205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.571985 systemd[1]: Started session-24.scope. Sep 13 00:55:59.573099 systemd-logind[1433]: New session 24 of user core. Sep 13 00:55:59.599219 kernel: audit: type=1103 audit(1757724959.564:1542): pid=6205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.599330 kernel: audit: type=1006 audit(1757724959.564:1543): pid=6205 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Sep 13 00:55:59.599354 kernel: audit: type=1300 audit(1757724959.564:1543): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4c5464b0 a2=3 a3=0 items=0 ppid=1 pid=6205 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:59.564000 audit[6205]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4c5464b0 a2=3 a3=0 items=0 ppid=1 pid=6205 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:59.564000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:59.625644 kernel: audit: type=1327 audit(1757724959.564:1543): proctitle=737368643A20636F7265205B707269765D Sep 13 00:55:59.578000 audit[6205]: USER_START pid=6205 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.580000 audit[6207]: CRED_ACQ pid=6207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.666931 kernel: audit: type=1105 audit(1757724959.578:1544): pid=6205 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:59.667076 kernel: audit: type=1103 audit(1757724959.580:1545): pid=6207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:00.035223 sshd[6205]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:00.036000 audit[6205]: USER_END pid=6205 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:00.038716 systemd[1]: sshd@21-10.200.4.44:22-10.200.16.10:48744.service: Deactivated successfully. Sep 13 00:56:00.039524 systemd[1]: session-24.scope: Deactivated successfully. Sep 13 00:56:00.047439 systemd-logind[1433]: Session 24 logged out. Waiting for processes to exit. Sep 13 00:56:00.048481 systemd-logind[1433]: Removed session 24. Sep 13 00:56:00.061668 kernel: audit: type=1106 audit(1757724960.036:1546): pid=6205 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:00.061789 kernel: audit: type=1104 audit(1757724960.036:1547): pid=6205 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:00.036000 audit[6205]: CRED_DISP pid=6205 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:00.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.44:22-10.200.16.10:48744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:03.009000 audit[4808]: AVC avc: denied { watch } for pid=4808 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.2278922063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c559,c771 tclass=file permissive=0 Sep 13 00:56:03.009000 audit[4808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0028165e0 a2=fc6 a3=0 items=0 ppid=3920 pid=4808 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c771 key=(null) Sep 13 00:56:03.009000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:56:05.151832 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:56:05.152041 kernel: audit: type=1130 audit(1757724965.140:1550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.44:22-10.200.16.10:52270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:05.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.44:22-10.200.16.10:52270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:05.141315 systemd[1]: Started sshd@22-10.200.4.44:22-10.200.16.10:52270.service. Sep 13 00:56:05.214000 audit[6220]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=6220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:05.234685 kernel: audit: type=1325 audit(1757724965.214:1551): table=filter:134 family=2 entries=20 op=nft_register_rule pid=6220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:05.234815 kernel: audit: type=1300 audit(1757724965.214:1551): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd9be023e0 a2=0 a3=7ffd9be023cc items=0 ppid=2605 pid=6220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.214000 audit[6220]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd9be023e0 a2=0 a3=7ffd9be023cc items=0 ppid=2605 pid=6220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:05.262130 kernel: audit: type=1327 audit(1757724965.214:1551): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:05.263000 audit[6220]: NETFILTER_CFG table=nat:135 family=2 entries=110 op=nft_register_chain pid=6220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:05.277664 kernel: audit: type=1325 audit(1757724965.263:1552): table=nat:135 family=2 entries=110 op=nft_register_chain pid=6220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:05.263000 audit[6220]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffd9be023e0 a2=0 a3=7ffd9be023cc items=0 ppid=2605 pid=6220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:05.315395 kernel: audit: type=1300 audit(1757724965.263:1552): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffd9be023e0 a2=0 a3=7ffd9be023cc items=0 ppid=2605 pid=6220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.315512 kernel: audit: type=1327 audit(1757724965.263:1552): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:05.732569 sshd[6217]: Accepted publickey for core from 10.200.16.10 port 52270 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:56:05.734269 sshd[6217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:56:05.731000 audit[6217]: USER_ACCT pid=6217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:05.757651 kernel: audit: type=1101 audit(1757724965.731:1553): pid=6217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:05.733000 audit[6217]: CRED_ACQ pid=6217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:05.781790 kernel: audit: type=1103 audit(1757724965.733:1554): pid=6217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:05.786213 systemd-logind[1433]: New session 25 of user core. Sep 13 00:56:05.796652 kernel: audit: type=1006 audit(1757724965.733:1555): pid=6217 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Sep 13 00:56:05.733000 audit[6217]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeedabc310 a2=3 a3=0 items=0 ppid=1 pid=6217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.733000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:05.796000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.796000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00432c520 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:56:05.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:05.796000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.796000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0125b8450 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:56:05.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:05.796000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6828 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.796000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00cf56780 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:56:05.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:05.799822 systemd[1]: Started session-25.scope. Sep 13 00:56:05.805000 audit[6217]: USER_START pid=6217 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:05.807000 audit[6221]: CRED_ACQ pid=6221 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:05.918000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.918000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005ae68d0 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:56:05.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:05.918000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.918000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005ae6930 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:56:05.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:05.919000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:05.919000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005204420 a2=fc6 a3=0 items=0 ppid=2169 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c947 key=(null) Sep 13 00:56:05.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 13 00:56:06.184074 systemd[1]: run-containerd-runc-k8s.io-4924a39a68904d546c88875dc8a45ad628655b6417e83e7d0d1ef39fe703a13f-runc.HH5cTP.mount: Deactivated successfully. Sep 13 00:56:06.269144 sshd[6217]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:06.269000 audit[6217]: USER_END pid=6217 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:06.270000 audit[6217]: CRED_DISP pid=6217 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:06.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.44:22-10.200.16.10:52270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:06.271918 systemd[1]: sshd@22-10.200.4.44:22-10.200.16.10:52270.service: Deactivated successfully. Sep 13 00:56:06.272757 systemd[1]: session-25.scope: Deactivated successfully. Sep 13 00:56:06.273594 systemd-logind[1433]: Session 25 logged out. Waiting for processes to exit. Sep 13 00:56:06.274418 systemd-logind[1433]: Removed session 25. Sep 13 00:56:06.427000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:06.427000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002cb50e0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:06.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:06.427000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:06.427000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cce060 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:06.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.466000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.472602 kernel: kauditd_printk_skb: 31 callbacks suppressed Sep 13 00:56:10.472742 kernel: audit: type=1400 audit(1757724970.466:1569): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.466000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d611c0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.492778 kernel: audit: type=1300 audit(1757724970.466:1569): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d611c0 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.538128 kernel: audit: type=1327 audit(1757724970.466:1569): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.541856 kernel: audit: type=1400 audit(1757724970.467:1570): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.467000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.467000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ccee20 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.587684 kernel: audit: type=1300 audit(1757724970.467:1570): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ccee20 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.612581 kernel: audit: type=1327 audit(1757724970.467:1570): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.612710 kernel: audit: type=1400 audit(1757724970.467:1571): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.467000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.467000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d61220 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.689306 kernel: audit: type=1300 audit(1757724970.467:1571): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d61220 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.689450 kernel: audit: type=1327 audit(1757724970.467:1571): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:10.468000 audit[2278]: AVC avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.468000 audit[2278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ccfc20 a2=fc6 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 key=(null) Sep 13 00:56:10.712758 kernel: audit: type=1400 audit(1757724970.468:1572): avc: denied { watch } for pid=2278 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6826 scontext=system_u:system_r:svirt_lxc_net_t:s0:c635,c812 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:56:10.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:56:11.371513 systemd[1]: Started sshd@23-10.200.4.44:22-10.200.16.10:54340.service. Sep 13 00:56:11.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.44:22-10.200.16.10:54340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:11.956000 audit[6270]: USER_ACCT pid=6270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:11.957607 sshd[6270]: Accepted publickey for core from 10.200.16.10 port 54340 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:56:11.957000 audit[6270]: CRED_ACQ pid=6270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:11.957000 audit[6270]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9373ab30 a2=3 a3=0 items=0 ppid=1 pid=6270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:11.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:11.958992 sshd[6270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:56:11.963707 systemd-logind[1433]: New session 26 of user core. Sep 13 00:56:11.964172 systemd[1]: Started session-26.scope. Sep 13 00:56:11.968000 audit[6270]: USER_START pid=6270 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:11.970000 audit[6272]: CRED_ACQ pid=6272 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:12.433183 sshd[6270]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:12.433000 audit[6270]: USER_END pid=6270 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:12.433000 audit[6270]: CRED_DISP pid=6270 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:12.435650 systemd[1]: sshd@23-10.200.4.44:22-10.200.16.10:54340.service: Deactivated successfully. Sep 13 00:56:12.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.44:22-10.200.16.10:54340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:12.436914 systemd[1]: session-26.scope: Deactivated successfully. Sep 13 00:56:12.436941 systemd-logind[1433]: Session 26 logged out. Waiting for processes to exit. Sep 13 00:56:12.437954 systemd-logind[1433]: Removed session 26. Sep 13 00:56:16.393000 audit[5361]: AVC avc: denied { watch } for pid=5361 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.3769461532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c495 tclass=file permissive=0 Sep 13 00:56:16.398854 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:56:16.398968 kernel: audit: type=1400 audit(1757724976.393:1582): avc: denied { watch } for pid=5361 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_52_43.3769461532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c495 tclass=file permissive=0 Sep 13 00:56:16.393000 audit[5361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014b64a0 a2=fc6 a3=0 items=0 ppid=4393 pid=5361 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 key=(null) Sep 13 00:56:16.444408 kernel: audit: type=1300 audit(1757724976.393:1582): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014b64a0 a2=fc6 a3=0 items=0 ppid=4393 pid=5361 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c495 key=(null) Sep 13 00:56:16.444523 kernel: audit: type=1327 audit(1757724976.393:1582): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:56:16.393000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:56:17.533138 systemd[1]: Started sshd@24-10.200.4.44:22-10.200.16.10:54354.service. Sep 13 00:56:17.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.44:22-10.200.16.10:54354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:17.553652 kernel: audit: type=1130 audit(1757724977.533:1583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.44:22-10.200.16.10:54354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:18.123000 audit[6290]: USER_ACCT pid=6290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.124024 sshd[6290]: Accepted publickey for core from 10.200.16.10 port 54354 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:56:18.145831 kernel: audit: type=1101 audit(1757724978.123:1584): pid=6290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.145000 audit[6290]: CRED_ACQ pid=6290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.146255 sshd[6290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:56:18.152400 systemd[1]: Started session-27.scope. Sep 13 00:56:18.153915 systemd-logind[1433]: New session 27 of user core. Sep 13 00:56:18.168060 kernel: audit: type=1103 audit(1757724978.145:1585): pid=6290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.168165 kernel: audit: type=1006 audit(1757724978.145:1586): pid=6290 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Sep 13 00:56:18.145000 audit[6290]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce83e2a0 a2=3 a3=0 items=0 ppid=1 pid=6290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:18.198177 kernel: audit: type=1300 audit(1757724978.145:1586): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce83e2a0 a2=3 a3=0 items=0 ppid=1 pid=6290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:18.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:18.205327 kernel: audit: type=1327 audit(1757724978.145:1586): proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:18.205406 kernel: audit: type=1105 audit(1757724978.159:1587): pid=6290 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.159000 audit[6290]: USER_START pid=6290 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.160000 audit[6292]: CRED_ACQ pid=6292 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.608868 sshd[6290]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:18.609000 audit[6290]: USER_END pid=6290 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.609000 audit[6290]: CRED_DISP pid=6290 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:18.611557 systemd[1]: sshd@24-10.200.4.44:22-10.200.16.10:54354.service: Deactivated successfully. Sep 13 00:56:18.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.44:22-10.200.16.10:54354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:18.612482 systemd[1]: session-27.scope: Deactivated successfully. Sep 13 00:56:18.613081 systemd-logind[1433]: Session 27 logged out. Waiting for processes to exit. Sep 13 00:56:18.613835 systemd-logind[1433]: Removed session 27. Sep 13 00:56:23.733412 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:56:23.733560 kernel: audit: type=1130 audit(1757724983.708:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.44:22-10.200.16.10:40638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:23.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.44:22-10.200.16.10:40638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:23.708942 systemd[1]: Started sshd@25-10.200.4.44:22-10.200.16.10:40638.service. Sep 13 00:56:24.294000 audit[6323]: USER_ACCT pid=6323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.295120 sshd[6323]: Accepted publickey for core from 10.200.16.10 port 40638 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:56:24.315000 audit[6323]: CRED_ACQ pid=6323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.316871 sshd[6323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:56:24.324470 systemd[1]: Started session-28.scope. Sep 13 00:56:24.325662 systemd-logind[1433]: New session 28 of user core. Sep 13 00:56:24.336996 kernel: audit: type=1101 audit(1757724984.294:1593): pid=6323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.337125 kernel: audit: type=1103 audit(1757724984.315:1594): pid=6323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.349933 kernel: audit: type=1006 audit(1757724984.315:1595): pid=6323 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Sep 13 00:56:24.315000 audit[6323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd762ad6e0 a2=3 a3=0 items=0 ppid=1 pid=6323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.369436 kernel: audit: type=1300 audit(1757724984.315:1595): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd762ad6e0 a2=3 a3=0 items=0 ppid=1 pid=6323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:24.369951 kernel: audit: type=1327 audit(1757724984.315:1595): proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:24.315000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:24.330000 audit[6323]: USER_START pid=6323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.376655 kernel: audit: type=1105 audit(1757724984.330:1596): pid=6323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.332000 audit[6325]: CRED_ACQ pid=6325 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.415451 kernel: audit: type=1103 audit(1757724984.332:1597): pid=6325 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.774796 sshd[6323]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:24.775000 audit[6323]: USER_END pid=6323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.778393 systemd[1]: sshd@25-10.200.4.44:22-10.200.16.10:40638.service: Deactivated successfully. Sep 13 00:56:24.779198 systemd[1]: session-28.scope: Deactivated successfully. Sep 13 00:56:24.780569 systemd-logind[1433]: Session 28 logged out. Waiting for processes to exit. Sep 13 00:56:24.781562 systemd-logind[1433]: Removed session 28. Sep 13 00:56:24.775000 audit[6323]: CRED_DISP pid=6323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.816673 kernel: audit: type=1106 audit(1757724984.775:1598): pid=6323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.816773 kernel: audit: type=1104 audit(1757724984.775:1599): pid=6323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:24.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.44:22-10.200.16.10:40638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:29.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.44:22-10.200.16.10:35450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:29.875293 systemd[1]: Started sshd@26-10.200.4.44:22-10.200.16.10:35450.service. Sep 13 00:56:29.880956 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:56:29.881041 kernel: audit: type=1130 audit(1757724989.874:1601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.44:22-10.200.16.10:35450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:56:30.469000 audit[6357]: USER_ACCT pid=6357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.469933 sshd[6357]: Accepted publickey for core from 10.200.16.10 port 35450 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:56:30.490000 audit[6357]: CRED_ACQ pid=6357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.491874 sshd[6357]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:56:30.498036 systemd[1]: Started session-29.scope. Sep 13 00:56:30.499282 systemd-logind[1433]: New session 29 of user core. Sep 13 00:56:30.511114 kernel: audit: type=1101 audit(1757724990.469:1602): pid=6357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.511201 kernel: audit: type=1103 audit(1757724990.490:1603): pid=6357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.523690 kernel: audit: type=1006 audit(1757724990.490:1604): pid=6357 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Sep 13 00:56:30.523782 kernel: audit: type=1300 audit(1757724990.490:1604): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc540b2ea0 a2=3 a3=0 items=0 ppid=1 pid=6357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:30.490000 audit[6357]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc540b2ea0 a2=3 a3=0 items=0 ppid=1 pid=6357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:30.547663 kernel: audit: type=1327 audit(1757724990.490:1604): proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:30.490000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:56:30.500000 audit[6357]: USER_START pid=6357 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.551652 kernel: audit: type=1105 audit(1757724990.500:1605): pid=6357 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.505000 audit[6359]: CRED_ACQ pid=6359 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.572666 kernel: audit: type=1103 audit(1757724990.505:1606): pid=6359 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.952351 sshd[6357]: pam_unix(sshd:session): session closed for user core Sep 13 00:56:30.952000 audit[6357]: USER_END pid=6357 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.955311 systemd[1]: sshd@26-10.200.4.44:22-10.200.16.10:35450.service: Deactivated successfully. Sep 13 00:56:30.956132 systemd[1]: session-29.scope: Deactivated successfully. Sep 13 00:56:30.957713 systemd-logind[1433]: Session 29 logged out. Waiting for processes to exit. Sep 13 00:56:30.958739 systemd-logind[1433]: Removed session 29. Sep 13 00:56:30.976653 kernel: audit: type=1106 audit(1757724990.952:1607): pid=6357 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.976756 kernel: audit: type=1104 audit(1757724990.953:1608): pid=6357 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.953000 audit[6357]: CRED_DISP pid=6357 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:56:30.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.44:22-10.200.16.10:35450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'